WO2022021997A1 - Network convergence method and networking method for network convergence, and device and storage medium - Google Patents

Network convergence method and networking method for network convergence, and device and storage medium Download PDF

Info

Publication number
WO2022021997A1
WO2022021997A1 PCT/CN2021/093077 CN2021093077W WO2022021997A1 WO 2022021997 A1 WO2022021997 A1 WO 2022021997A1 CN 2021093077 W CN2021093077 W CN 2021093077W WO 2022021997 A1 WO2022021997 A1 WO 2022021997A1
Authority
WO
WIPO (PCT)
Prior art keywords
operator
network
network element
element node
chain
Prior art date
Application number
PCT/CN2021/093077
Other languages
French (fr)
Chinese (zh)
Inventor
何缨
古莹莹
江漫滔
Original Assignee
厦门潭宏信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=73314723&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=WO2022021997(A1) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by 厦门潭宏信息科技有限公司 filed Critical 厦门潭宏信息科技有限公司
Publication of WO2022021997A1 publication Critical patent/WO2022021997A1/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • H04L63/0218Distributed architectures, e.g. distributed firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates

Definitions

  • the present invention relates to the technical field of blockchain, and in particular, to a network fusion and its networking method, equipment and storage medium.
  • the traditional mobile phone operating system once connected to the operator's network, will virtualize a network interface, and configure the IP address assigned by the core network on this interface.
  • traditional mobile phones can activate multiple connections (corresponding to multiple interfaces) at the same time through multiple APNs, or a single APN with multiple PDP Contexts, and assign an IP address to each interface, but the IP addresses on these interfaces must be different. If they are the same, the phone will refuse to access the network.
  • the traditional connection method of multiple APNs of mobile phones will generate multiple IP address conflicts.
  • the blockchain network system is used in various scenarios because of its technical effects such as security and not easy to tamper with, to solve technical problems such as resources, information or data that are easily modified in various scenarios, but its consensus process is time-consuming. , in the actual implementation process, the speed is slow, and there are few technical solutions that work well.
  • the present invention provides a network fusion and its networking method, equipment and storage medium, which can quickly form a network, realize security isolation, network fusion, resource sharing, and improve access speed and experience.
  • a networking method for network integration comprising: parsing more than one first transaction that has passed the verification, and determining whether the first transaction is a transaction that includes a first operator's network element node requesting networking; The consensus method required by the first operator network element node requesting networking, and the first transaction content including the identity of the first operator network element node requesting networking, based on the NFV/SDN technology for the first operator network requesting to join.
  • the element node performs network fragmentation, assigns the first operator network element node requesting networking to the first network, and sends a message to the first operator network element node to assign the first operator network element node requesting networking to the first network element node.
  • a message from a network receives a response message from the first operator's network element node requesting networking; determine whether the first operator's network element node requesting networking agrees to be allocated to the first network; if so, transfer the first transaction, and Including the transaction of allocating the first operator's network element node requesting networking to the first network is packaged and uploaded to the chain; if not, the first transaction and the first operator's network element node containing the request for networking are rejected. Transactions allocated to the first network are packaged and uploaded to the chain.
  • the network fragmentation instantiates physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method, More than one first network is formed.
  • one first network corresponds to one IP protocol stack instance.
  • a networking method for network convergence comprising: sending to a root chain at least a consensus method required by a first operator network element node requesting networking, a request for networking The first transaction including the identity of the first operator's network element node; receiving a message from the root chain that assigns the first operator's network element node requesting networking to the first network; sending an agreement or disagreement to the root chain A response message distributed to the first network.
  • a method for network convergence comprising: receiving a request from a network element node of a first operator to utilize resources of a second operator different from the first operator.
  • the first conversion contract interface is sent to the first operator's network element node; the first operator's network element node accesses and exits the first conversion contract interface message; send the basic information of the first operator's network element node accessing and exiting the first conversion contract interface to the first operator's network element node; upload the chain after receiving the confirmation message sent by the first operator's network element node; wherein, More than one first conversion contract is set on the root chain, and the first conversion contract is used to convert the resource access and utilization interface of the second operator into an interface accessible and usable by the network element node of the first operator method; the first operator's network element node sends a first request transaction to the root chain that requests to use the resources of
  • the first operator's network element node identity verification process includes: performing a hash operation on an encryption key to be verified by the first operator's network element node to obtain a hash value of the encryption key to be verified, Compare with the hash value of the encryption key on the root chain, if they are consistent, decrypt the ciphertext of the identity information of the first operator's network element node through the encryption key and obtain the first operator's network element node through AES256 algorithm decryption
  • the plaintext of the identity information, the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the root chain, the identity verification of the first operator's network element node fails;
  • the process of encrypting the identity of the first operator's network element node is: using the encryption key to obtain the ciphertext of the first operator's network element node identity information from the plaintext of the first operator's network element node identity information according to the AES256 algorithm
  • the on-chain includes saving the on-chain content in a cloud computing or fog computing storage space.
  • the root chain and the copyright registration agency perform data exchange through a first conversion contract interface;
  • the data exchange method includes: receiving a second request for registering a digital copyright certificate from a first operator's network element node Transaction, after the identity verification of the first operator's network element node is passed, the root chain sends a second request transaction for the first operator's network element node to request the registration of the digital copyright certificate to the digital rights registration agency through the first conversion contract interface;
  • the root chain receives the digital copyright certificate containing DCI sent by the digital copyright registration authority and forwards it to the first operator's network element node; if it does not meet the review regulations of the digital copyright registration authority, the root chain receives the digital copyright registration authority.
  • the notice sent by the organization to modify the registered digital copyright material, or not to grant the digital copyright certificate, is forwarded to the first operator's network element node; or, receiving the request to verify the digital copyright certificate DCI sent by the first operator's network element node
  • the third request transaction after the identity verification of the first operator's network element node is passed, the root chain sends the third request transaction of the first operator's network element node requesting the verification of the digital rights certificate DCI to the digital rights registration authority through the first conversion contract interface; If the verification of the digital rights registration authority is passed, the root chain receives the notification that the DCI verification of the digital copyright certificate is passed by the digital rights registration authority, and forwards it to the first operator's network element node; if the verification of the digital rights registration authority fails, the root chain receives the notification The notice that the DCI verification of the digital copyright certificate is not passed by the digital copyright registration agency is forwarded to the first operator's network element node, the copyright protection agency and the evidence platform recognized by the intellectual property
  • a method for network fusion comprising: sending a first request transaction to a root chain for requesting to utilize resources of a second operator different from the first operator; If the identity verification of the operator's network element node passes, the first conversion contract interface is received; the first conversion contract interface is accessed, and a message for accessing the first conversion contract interface is sent to the root chain; the first conversion contract interface is exited, and the root chain is sent to the root chain.
  • Send the message of exiting the first conversion contract interface ; receive the basic information of accessing and exiting the first conversion contract interface from the root chain; verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
  • the first conversion contract interface is also used for data interaction with the copyright registration authority, and the method for data interaction with the copyright registration authority is: sending the first request to the root chain of the materials required for registering the digital copyright certificate. 2. Request transaction; if it complies with the review regulations of the digital copyright registration agency, receive the digital copyright certificate containing DCI sent by the digital copyright registration agency forwarded by the root chain; A notice sent by a copyright registry to modify registered digital copyright material, or not to grant a digital copyright certificate.
  • a method for network convergence comprising: sending a request for utilizing resources of a second operator different from the first operator to a network element node of a first operator; A first conversion contract interface sent by an operator network element node; access the first conversion contract interface, and send a message for accessing the first conversion contract interface to the root chain through the first operator network element node; exit the first conversion contract interface , and send the message of exiting the first conversion contract interface to the root chain through the network element node of the first operator; receive the basic information of accessing and exiting the interface of the first conversion contract sent by the root chain forwarded by the network element node of the first operator information; verify the basic information for accessing and exiting the first conversion contract interface, and feed it back to the root chain through the first operator's network element node; After the resource is requested, the first operator's network element node sends a first request transaction for the terminal to request the use of resources of a second operator different from the first operator to the root chain
  • the terminals use space-based networks.
  • Internet 5G communication or satellite-to-earth communication.
  • the first operator network element node is a communication base station or a satellite.
  • the present invention provides an apparatus comprising: one or more processors; a memory for storing one or more programs, when the one or more programs are executed by the one or more processors When executed, the one or more processors are caused to perform a method as described above.
  • the present invention provides a storage medium storing a computer program, and when the program is executed by a processor, the method as described in any of the above is implemented.
  • the communication mode of the networking method for network convergence described in the embodiment of the present application is MQTT.
  • the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration.
  • Logic isolation is achieved through network slicing, which solves the problems of low security isolation and difficult deployment of NFV/SDN network slicing.
  • the basic information of the first operator's network element node accessing and exiting the first conversion contract interface including but not limited to the first operator's network element node accessing the first conversion contract
  • the time of the interface the time when the first operator's network element node exits the interface of the first conversion contract; the size of the traffic, the duration of the frequency band occupation, the cost, etc.; the process of realizing settlement, resource sharing, and network integration; realizing communication and data and value exchange.
  • FIG. 1 is a schematic structural diagram of a device according to an embodiment of the present invention.
  • FIG. 2 is one of the schematic flowcharts of a networking method for network convergence proposed by an embodiment of the present invention.
  • FIG. 3 is a second schematic flowchart of a networking method for network convergence proposed by an embodiment of the present invention.
  • FIG. 4 is one of the schematic flowcharts of a network fusion method proposed by an embodiment of the present invention.
  • FIG. 5 is a second schematic flowchart of a network fusion method proposed by an embodiment of the present invention.
  • FIG. 6 is a third schematic flowchart of a network fusion method proposed by an embodiment of the present invention.
  • a networking method for network fusion suitable for virtual machines or cluster nodes on the root chain of the blockchain system as network fusion, as shown in Figure 2, including:
  • the first transaction content including at least the consensus method required by the first operator's network element node requesting networking and the identity of the first operator's network element node requesting networking, based on NFV/SDN technology
  • the first operator network element node performs network fragmentation, assigns the first operator network element node requesting networking to the first network, and sends the first operator network element node requesting networking to the first operator network element node. a message allocated by the meta node to the first network;
  • S106 Package and upload the first transaction and the transaction including the allocation of the first operator's network element node requesting networking to the first network; if not, then
  • the network element refers to the equipment in the network.
  • the network element includes the base station, and in addition to the MME, the SGW, and the PDN.
  • the first in the first operators refers to a general term, which does not correspond to a specific operator name, and can be transformed into the same or different operator names according to actual application requirements.
  • the first operator network element node in this embodiment refers to a network element that can operate as a node of the blockchain system, such as base stations, servers, clusters, etc. of operators such as China Mobile, China Unicom, or China Telecom; for example, various operators fog computing nodes, cloud computing center nodes, and edge computing nodes.
  • the identity of the first operator's network element node includes but is not limited to the operator system where the first operator's network element node is located, such as China Mobile, China Unicom or China Telecom, etc.; the name of the network element itself, such as a switch, base station, or server, etc.; The IP address, physical address, etc. of the operator's network element node is convenient for the root chain to judge and identify according to the network fragmentation rules, and to perform network fragmentation.
  • the network sharding rules set by the root chain are based on the principle of fairness and justice, preventing each sharded network from becoming centralized, and ensuring the data security of each sharded network, the authenticity of the data and the immutability of the data, which can be based on actual application requirements.
  • Flexible settings such as scrambled allocation of network element nodes of different operators to different network shards, that is, nodes from the same operator cannot exist in the same sharded network; Strong nodes are separately set up in different sharded networks to prevent the computing power of the sharded networks from being too different; to ensure that the computing power of each sharded network is balanced, etc.
  • the network sharding rule requirements of the root chain of the blockchain system of network fusion the network sharding is performed on the first operator's network element node requesting to join based on the NFV/SDN technology, and the first operator's network element node is allocated to The first network completes the re-networking of network element devices of different operators, which facilitates network integration by using the principle of root chain priority.
  • the communication mode of the networking method for network convergence described in this embodiment is MQTT.
  • the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration.
  • Logic isolation is achieved through network slicing, which solves the problems of low security isolation and difficult deployment of NFV/SDN network slicing.
  • 5G infrastructure sharing mainly refers to the mobile network operator (MNO) of the seller abstracting and dividing physical and radio infrastructure resources into different virtual resources to provide them through network virtualization. Each virtual resource has its own distinct functions, services, and goals.
  • Blockchain can help achieve more efficient and secure 5G resource sharing and usage traceability. Using smart contracts, decentralized protocol sharing and payments can be automated.
  • the root chain sets the principles and methods to follow for network slicing.
  • NFV technology is used in the 5G wireless access network and core network.
  • the main terminal equipment in the 4G network is the mobile phone, and the wireless access network part in the network (including the digital unit (DU) ) and radio frequency unit (RU)) and the core network part all use special equipment provided by equipment manufacturers.
  • NFV Network Function Virtualization
  • MME software and hardware functions of special equipment in the network
  • S/P-GW software and hardware functions of special equipment in the core network
  • PCRF physical unit DU in the wireless access network
  • VMs Virtual Machines
  • These web hosts are based on industry standard commodity servers, they are COTS commercial off-the-shelf products that are low cost and easy to install. Simply put, it replaces dedicated network element devices in the network with industry-standard servers, storage, and network devices.
  • the wireless access network part is called the edge cloud (Edge Cloud), and the core network part is called the core cloud (Core Cloud), which can be sliced and allocated by the network as nodes in the networking method.
  • the VMs in the edge cloud and the VMs in the core cloud are interconnected through SDN (software-defined networking). After the network adopts NFV and SDN technology, it is very easy to perform slicing, and the network is horizontally "sliced” into multiple pieces like bread. Virtual subnets (slices) are fine.
  • the network fragmentation instantiates the physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method to form more than one network element node.
  • first network instantiates the physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method to form more than one network element node.
  • smart contracts on the root chain can be implemented to allow different requesters to autonomously and dynamically negotiate various service contract terms.
  • operators can also register and publish network slicing functions on the blockchain, such as:
  • the purpose of the smart contract slicing agreement is to open up a dedicated virtual network for different industries or enterprises on the operator's 5G network to meet the needs of the industry or enterprise's specialization.
  • the operator's original pipeline connection for individuals or individuals can be isolated from the public users on the network and take their own dedicated roads; they can also do simple network maintenance based on slicing networks; they can even obtain relatively ordinary users through slicing More guaranteed SLA.
  • Guarantee business SLA including traditional network indicators such as bandwidth, delay, packet loss and jitter, and improve indicator advantages
  • 5G network feature support a UE supports up to 8 slices at the same time, the slice identifier has a maximum of 32 bits, of which the slice type has a maximum of 256, and each slice type can be subdivided into a maximum of 24 bits.
  • Delay about 4ms from terminal to base station; about 5ms from base station to edge computing; about 5ms from base station to provincial core.
  • Isolation Obtain a logically independent network, avoid cyber risks, and avoid leaks.
  • slice tenants can view network statistics and status related to their slices.
  • the three major scenarios defined by the standard, eMBB, uRLLC, and mMTC, are considered to be three public networks, not one, because their implementation technologies (especially those on the wireless side) are different.
  • the SLA guarantees provided by these three scenarios, such as low latency and large-scale terminal access, are valuable.
  • further subdivision within each scenario, such as "high/medium/low" SLA distinction within eMBB, belongs to the provision of SLA guarantees on the public network.
  • NSSAI is one of the most innovative concepts related to 5G slicing.
  • NSSAI is a collection of multiple S-NSSAIs.
  • S-NSSAI is a 32-bit integer, which can be further divided into two parts: SD and SST, where SD is 24 bits and SST is 8 bits.
  • SD is 24 bits
  • SST is 8 bits.
  • S-NSSAI is just an integer, which is very easy to handle.
  • SST defines the type of slice network. For example, if SST is 1, it means that the slice is an eMBB slice; if it is 2, it is a uRLLC slice; if it is 3, it is mMTC, all of which are well-known 5G service types.
  • the smart contract agrees to sign one or several S-NSSAIs on the core network, which can be simply considered to sign one or more slices.
  • a 5G terminal accesses the network, it will carry one or more subscribed S-NSSAIs.
  • the network device knows the network slice that the terminal wants to access according to the S-NSSAI, and accesses the terminal to this slice. It can be seen that when the 5G network has multiple slices, S-NSSAI will guide the network and which slice to connect the terminal to.
  • a terminal can bring up to 8 S-NSSAIs to the 5G network at the same time, that is, it can access 8 slices at the same time.
  • This not only puts forward requirements on the baseband chip of the mobile phone (to handle S-NSSAI), but also imposes new requirements on traditional mobile phone operating systems and applications. The biggest requirement is to require the terminal operating system to support the "Multiple Instance IP Stack".
  • the traditional mobile phone operating system once connected to the operator's network, will virtualize a network interface, and configure the IP address assigned by the core network on this interface.
  • traditional mobile phones can activate multiple connections (corresponding to multiple interfaces) at the same time through multiple APNs, or a single APN with multiple PDP Contexts, and assign an IP address to each interface, but the IP addresses on these interfaces must be different. If they are the same, the phone will refuse to access the network.
  • the mobile phone When it comes to 5G slicing scenarios, the situation will be different. In many cases, the mobile phone will access multiple slices at the same time. The IP address of each slice may be assigned independently, or even not controlled by the operator, but assigned by the enterprise that purchased the slice. In this way, there is a high probability that the mobile phone will have an IP address conflict.
  • one of the first networks corresponds to one instance of the IP protocol stack.
  • the IP protocol stack modification of the operating system kernel is established to realize multi-instantiated protocol stacks, and one slice corresponds to one IP protocol stack instance. Similar to the concept of VRF on routers, but more complicated, because the problem of different APPs accessing different protocol stack instances is also considered. And based on the embodiment of the present invention, a standardized, artificial intelligence API interface is adopted.
  • NSSAI and S-NSSAI are inclusive relationships.
  • An NSSAI contains multiple S-NSSAIs.
  • the preceding S in S-NSSAI means Single.
  • network slicing refers to physical infrastructure and underlying network service technology core network network slicing
  • Slice sharing network elements AUSF, UDM, NSSF.
  • Slicing dedicated network elements SMF, PCF, UPF, AMF
  • Scenario Scenarios with high security isolation requirements/customization requirements. Multi-slice scenarios on the same terminal are not supported.
  • Partial control dedicated to the user plane:
  • Slicing dedicated network elements SMF, UPF
  • the security isolation is average. If the protection method based on the root chain is used, the security is very good and the cost is low.
  • the reason why it is difficult to deploy the existing network integration is that the four operators' communication base stations are all independently constructed, and the construction of marine base stations in the remote areas of the west, deserts, plateaus, islands, and oceans is difficult and the cost is extremely high.
  • the unification and integration of the 5G core network standardization has been formed, the service network cannot be integrated, resulting in a segmentation of the service network, so that the capacity of the virtual machine is physically limited.
  • the virtual machine of the root chain needs to get rid of physical restrictions, so that the virtual machine space is infinite.
  • the smart contract stored is also infinite, so as to solve the unified integration of the service network.
  • the space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a mesh network that uses a small platform to route the inter-satellite network of microwave links to provide data connections.” For example: there are 4 million in the world. Base stations, of which 3 million base stations are in China, but still find that some small areas on highways and large cities have insufficient network coverage, and the delay will reach hundreds of milliseconds or even ten seconds. For the Internet of Things, this will lead to transmission delays. There is a huge problem in synchronization, which may lead to the collapse of the entire Internet of Things.
  • cloud services will be Space satellites can be used, that is, to further expand cloud computing into space computing, and space computing has no physical limitations.
  • big data is stored under the chain, and the virtual machine can be infinitely large without physical limitations in cloud computing.
  • P2P network architecture so we propose a space-based Internet that integrates the terrestrial 5G core network and mobile base stations to provide data backhaul. It is a mesh network that uses a small platform to route microwave links. Inter-satellite network to provide data connection technology plan.
  • the microwave link is used to solve the problem that the base station receives satellite signals.
  • the microwave link is to improve the base station and can use microwave
  • the spot beam covers the user, and the wave speed control technology is used to realize the signal reception to the service terminal, that is, the IoT sensor terminal.
  • Slice sharing network elements PCF, SMF, AUSF, UDM, NSSF, AMF;
  • Dedicated network element for slicing UPF;
  • the access network can perceive slices, realize slice-level resource allocation, isolation, and quality assurance, and realize differentiated processing of traffic in different slices; different slices share wireless network resources as much as possible to maximize the utilization of wireless network resources.
  • the access network supports the selection of some functions of the slicing core network
  • the access network supports slice parameters based on slice SLA mapping to realize slice-level resource allocation and scheduling;
  • Slices can be shared or dedicated in access network resources
  • the access network supports resource isolation of different slices
  • the access network supports slice availability
  • the access network supports single terminal, multi-slice and multi-connection
  • Slicing requirements for access network management supported slicing instances, customized configuration of slicing functions, slicing parameter indicators (SLA quantification);
  • the terminal supports the ability to select different network slices for different services, and supports the identification of the access network slice (S-NSSAI) in the access network and core network signaling;
  • S-NSSAI access network slice
  • the terminal supports the ability to store and update network slice related identifiers and slice selection strategies
  • the terminal supports carrying relevant slice identifiers in the access network and core network signaling, and transmits it to the network;
  • the terminal can access one network slice at the same time, and can also access multiple network slices at the same time;
  • the terminal can obtain the network slicing service through one or more wireless network sites at the same time.
  • the technical solution of transmission network slicing is hard isolation and soft isolation, which can adapt to different service requirements, including bandwidth, delay, jitter, and security.
  • Wireless devices configure NSSAI to VLAN address mapping
  • the intra-provincial transmission is networked according to SPN: (1) VPN pipes are established according to the end-to-end SE sliced Ethernet channel, end-to-end crossover is configured, and hard isolation is supported. (2) Establish VPN pipes according to end-to-end L2VPN or L3VPN to support soft isolation;
  • the provincial network is based on SPN+OTN and supports VPN.
  • the core network platform configures S-NSSAI to IP address mapping
  • Core network slices enter different VPN slices by routing IP information.
  • Generate end-to-end configuration policies interact with network management functions, and configure various network functions in network slices.
  • the network slice management function has an end-to-end network slice quality indicator view; the sub-network slice management function is responsible for the quality assurance mechanism in each domain.
  • the network slicing core network is implemented using virtualization, and wireless virtualization needs to be further confirmed;
  • the operator receives the demand, analyzes the business demand, and generates the network demand (network slice template): business model, configuration model, and resource model.
  • the network is "cut” into 4 “slices”:
  • High-definition video slicing After the digital unit (DU) and some core network functions in the original network are virtualized, storage servers are added, and they are unified into the edge cloud. And some virtualized core network functions are put into the core cloud.
  • Mobile phone slicing After the digital unit (DU) of the wireless access part of the original network is virtualized, it is put into the edge cloud.
  • the core network functions of the original network, including IMS, are virtualized and put into the core cloud.
  • Mission-critical IoT slicing Due to high latency requirements, in order to minimize end-to-end latency, the core network functions and related servers of the original network are all moved to the edge cloud.
  • the network structure is as follows: Of course, network slicing technology is not limited to these types of slices, it is flexible, and operators can customize their own virtual networks according to application scenarios.
  • the 5G slice network connects edge clouds and VMs in cloud computing through SDN.
  • the hypervisor of the server runs a built-in vRouter/vSwitch.
  • the SDN controller is responsible for creating SDN tunnels between the virtual server and the DC G/W router. Then, the SDN controller executes SDN tunnels and MPLS. Mapping between L3VPNs to establish a connection between cloud computing and edge cloud.
  • Crowdsourcing 5G infrastructure By sharing benefits, introducing social capital, and conducting bidding in the form of resource investment.
  • IoT device management and authentication In 5G, connection latency for millions of IoT devices is expected to be less than 1 millisecond. The combination of such a large number of IoT devices opens up possibilities for new business models and services for future mobile users.
  • the decentralized management solution based on blockchain will have higher trust, visibility, traceability, and can also realize automatic payment.
  • Blockchain helps solve these problems.
  • the integration of blockchain and 5G can redefine the era of the digital economy.
  • Blockchain can be seen as a key enabler for securing 5G networks.
  • Blockchain provides infrastructure support for data confirmation in the 5G era.
  • Multi-party collaboration In the 5G era, operators need to completely overhaul their back-end systems to manage a more complex 5G ecosystem consisting of more parties and networks. Today's systems are simply not suited to handle this. In this way, blockchain is becoming an efficient, secure, scalable and transparent process for operators to do this, and to support the multi-party collaboration that is critical to the future success of 5G.
  • end users can make complaints and suggestions on network services through the APP, and the complaint ID will be displayed in the resource details through the blockchain after supplemented by relevant network performance parameters; resource alarms generated by the lessee during the use of network resources And the needs to be optimized can also be notified to the lessor through the blockchain; the evaluation and feedback of the user and the lessee on the service will be considered as a settlement factor and reflected in the settlement.
  • the service evaluation scenario establishes a supervision and feedback mechanism for service providers through blockchain, improves network service quality and end customer perception, protects the interests of investors and lessees, and maintains the healthy operation of the co-construction and sharing mechanism.
  • a networking method for network convergence applicable to a first operator network element node requesting networking, according to the above-mentioned networking method for network convergence, as shown in Figure 3, including:
  • S201 Send a first transaction to the root chain including at least the consensus method required by the first operator network element node requesting networking and the identity of the first operator network element node requesting networking;
  • a network fusion method suitable for virtual machines or cluster nodes on the root chain of the blockchain system as network fusion, as shown in Figure 4, including:
  • S301 Receive a first request transaction from a network element node of a first operator that requests to use resources of a second operator different from the first operator. After the identity verification of the network element node of the first operator is passed, the first The conversion contract interface is sent to the network element node of the first operator;
  • more than one first conversion contract is set on the root chain, and the first conversion contract is used to convert the resource access and utilization interface of the second operator into a network element node of the first operator that can be accessed and used. interface;
  • the first operator network element node sends a first request transaction to the root chain for requesting to utilize resources of a second operator different from the first operator;
  • Access the first conversion contract interface and send a message to the root chain to access the first conversion contract interface;
  • the resources include but are not limited to network resources such as video resources and traffic resources, as well as virtualized hardware resources.
  • the first conversion contract can be divided into different types. After the hardware resources are virtualized, the base stations, servers, computing centers, etc. of different operators can be opened to the outside world.
  • the first conversion contract on the root chain The function can be used for base station utilization and access interface conversion between different operators; or interface conversion for computing center access and utilization between different operators, etc.
  • Blockchain can help achieve more efficient and secure 5G resource sharing and usage traceability.
  • decentralized protocol sharing and payments can be automated.
  • Identity verification is required before the first operator's network element node accesses the first conversion contract interface for the first time; the identity verification method is: comparing whether the hash value of the first operator's network element node is consistent with the hash value stored in the root chain , if they are consistent, allow access to prevent attacks and ensure network security.
  • Basic information of the first operator's network element node accessing and exiting the first conversion contract interface including but not limited to the time when the first operator's network element node accesses the first conversion contract interface, the first operator's network element node exiting the first conversion contract The time of the contract interface; the size of the traffic, the duration of the frequency band occupation, the cost, etc.; the process of realizing settlement, resource sharing, and network integration; realizing communication and data and value exchange.
  • the process of the first operator's network element node identity verification includes:
  • the encryption key is used to decrypt the ciphertext of the identity information of the first operator's network element node through AES256 algorithm to obtain the plaintext of the identity information of the first operator's network element node, and the identity verification of the access party is passed; if the encryption key to be verified is hashed If it is inconsistent with the hash value of the encryption key on the root chain, the first operator's network element node identity verification fails;
  • hash value of the encryption key is obtained, and the hash value of the encryption key and the ciphertext of the identity information of the first operator's network element node are uploaded in the root chain.
  • the on-chain includes saving the on-chain content in a cloud computing or fog computing storage space.
  • Cloud computing or fog computing storage space can belong to different operators or a certain big data computing center; it can also come from different network shards, that is, different first networks, which are not limited .
  • the data transmission communication method is MQTT.
  • the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration.
  • the root chain and the copyright registration agency perform data exchange through a first conversion contract interface;
  • the data exchange method includes: receiving a request for registration number sent by the first operator's network element node
  • the second request transaction of the copyright certificate after the identity verification of the first operator's network element node is passed, the root chain sends the second request of the first operator's network element node to request the registration of the digital copyright certificate to the digital rights registration authority through the first conversion contract interface Transaction; if it complies with the review regulations of the digital copyright registration agency, the root chain receives the digital copyright certificate containing the DCI sent by the digital copyright registration agency, and forwards it to the network element node of the first operator; if it does not meet the review regulations of the digital copyright registration agency, then The root chain receives the notification of modifying the registered digital copyright material sent by the digital copyright registration agency, or the notification of not granting the digital copyright certificate, and forwards it to the first operator's network element node; or, receives the request
  • the root chain After the identity verification of the first operator's network element node is passed, the root chain sends the first operator's network element node to the digital rights registration agency through the first conversion contract interface to request the verification of the digital copyright certificate DCI.
  • the third request transaction if the verification of the digital rights registration authority is passed, the root chain receives the notification of the verification of the DCI of the digital copyright certificate sent by the digital rights registration authority, and forwards it to the network element node of the first operator; if the verification of the digital rights registration authority does not If it passes, the root chain receives the notification that the DCI verification of the digital copyright certificate is not passed by the digital copyright registration agency, and forwards it to the first operator's network element node, the copyright protection agency and the evidence platform recognized by the intellectual property court.
  • the first conversion contract interface is an API interface, including the root chain receiving the digital copyright certificate data information containing DCI issued by the copyright registration agency; including the root chain sending the material content required for the registration and application of the digital copyright certificate to the copyright registration agency, and the application includes A request for the data information of the digital copyright certificate with DCI; including the application of the root chain to the copyright registration authority to verify the data information of the digital copyright certificate containing the DCI.
  • the data interaction adopts the timestamp of the Time Service Center of the Chinese Academy of Sciences to form the transaction data on the chain, and the formation of the DCI is also formed by the copyright registration agency using the digital signature of the timestamp of the Time Service Center of the Chinese Academy of Sciences.
  • a network fusion method suitable for nodes (including cluster nodes) in a sharded network as a network fusion blockchain system, according to any one of the network fusion methods described above, as shown in Figure 5, including :
  • S406 verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
  • the first conversion contract interface is also used for data interaction with the copyright registration authority
  • the method for data interaction with the copyright registration authority is: sending a request to the root chain to register a digital copyright certificate The second request transaction of the required materials; if it meets the review regulations of the digital rights registration agency, receive the digital copyright certificate containing DCI sent by the digital rights registration agency forwarded by the root chain; if it does not meet the review regulations of the digital rights registration agency, receive The notice sent by the digital copyright registration agency forwarded by the root chain to modify the registered digital copyright material, or not to grant a digital copyright certificate.
  • the root chain supports multi-chain structure: a consortium chain for communication security; a cross-chain based on the consortium chain, the cross-chain of the main chain and the side chain constructed by the consortium gateway can realize the transaction chain accounting between operators, A layered channel payment system for off-chain transactions; a professional wallet system based on professional payment cross-chains; a notary network system that transmits valid legal proofs between nodes; between chains, consortium chains and consortium-based chains
  • the cross-chain, payment wallet system, and notary network system use API to realize data interaction, traffic interconnection, and token transaction.
  • various applications can be run independently. Mobile phone users can pass the CA operator without having to hold Automated transactions with sensitive data.
  • a network fusion method suitable for terminals (such as mobile phones, pads, notebook computers, desktop computers and other terminal equipment), according to a network fusion method described in any one of the above, as shown in Figure 6, including:
  • S506 verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain through the first operator's network element node;
  • the network element node of the first operator sends a first request transaction for the terminal to request the use of resources of a second operator different from the first operator to the root chain;
  • the first conversion contract interface is received and forwarded to the terminal;
  • Terminals include but are not limited to mobile phones, pads, notebook computers, desktop computers and other terminal equipment.
  • the root chain saves the complete account book.
  • end users can make complaints about network services through the above verification or report in the application.
  • the complaint ID will be displayed on the resource through the blockchain after supplemented by relevant network performance parameters.
  • the resource alarms and needs to be optimized generated by different users in the use of network resources can also be notified to different operators through the blockchain; the evaluation and feedback of users and operators on services will be considered as a settlement factor.
  • the price is reflected in the settlement.
  • the service evaluation scenario establishes a supervision and feedback mechanism for service providers through blockchain, improves network service quality and end customer perception, protects the interests of investors and lessees, and maintains the healthy operation of the co-construction and sharing mechanism.
  • the terminal 5G communication or satellite-to-ground communication is used between them.
  • An optional implementation is that between the terminal and the first operator's network element node, between the first operator's network element node and the root chain, and between the first operator's network element node, and between the terminals.
  • An optional implementation is that the first operator network element node is a communication base station or a satellite.
  • the IP data enters the multiplexer after being packaged through the IP data broadcasting system.
  • TV programs and voice programs are broadcast through the TV broadcast system and the voice broadcast system respectively.
  • MPE-5 encoding, statistical multiplexing, and then multiplexing with the IP-packed signal they are sent to the satellite uplink after modulation and optical cable transmission.
  • the broadcast signal covers the whole area, and the data exchange with the radio and television network is realized based on the Internet.
  • Space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a Mesh network that uses an inter-satellite network that routes microwave links on a small platform to provide data connections.
  • DVB-DASH defines the delivery of TV content based on the MPEG DASH specification and via HTTP adaptive streaming.
  • MPEG DASH is the first internationally standardized HTTP-based adaptive bitrate streaming solution.
  • additional restrictions and requirements are defined in DVB-DASH, and reference is made to the DVB Toolbox for video and audio codecs suitable for use with MPEG DASH.
  • the Blue Book includes high-definition television (HDTV), ultra-high-definition television (UHDTV), high dynamic range (HDR) television, high frame rate (HFR) video, and next-generation audio (NGA). It also explains how to achieve low-latency delivery and content rendering.
  • DASH player Due to segment lengths and unknown performance of the delivery network, some delays in Internet-delivered content are introduced in the DASH player.
  • the strategy adopted by the player is usually to buffer multiple segments to reduce the chance of stuttering. Shorter segments can also be used to achieve lower latency. But shorter segments make it harder for the encoder to work efficiently, so the video quality seen by the end user suffers.
  • the solution for low latency in DVB-DASH is to divide fragments into smaller chunks. Instead of outputting the entire segment at once, the encoder divides the segment into groups of frames, where none of the frames in a group need frames from a later group to be decoded. The DASH packager then puts each set of frames into a CMAF block and passes it into the CDN.
  • MPD Media Presentation Description
  • NGN is a packet network, which provides a variety of services including telecommunication services, and can utilize a variety of bandwidths and transport technologies with QoS capabilities to realize the separation of business functions and underlying transport technologies.
  • softswitch As the core, it can provide a comprehensive and open network architecture based on packet technology including voice, data, video and multimedia services.
  • softswitch As the core, it can provide a comprehensive and open network architecture based on packet technology including voice, data, video and multimedia services.
  • the space-based Internet realizes data transmission through satellites, which means that satellites play the role of base stations in the Internet. Therefore, compared with other communication methods, the biggest difference is satellites. Microwave chips and components that receive and send signals are also needed via satellite. The corresponding basic software is also different. The hardware and software of storage and computing are similar to other methods.
  • the application scenario is easy to expand the application: the Internet satellite has only a dense orbit of about 400km, so its ground receiving antenna is very small, and the terminal is also very small (a small round box of a router with a diameter of 15 cm), not a high-orbit satellite. A very large satellite receiver, so the application scenarios of satellite Internet are very rich. Putting it in the car or at home can complete the construction and penetration of the global Internet.
  • 3GPP and ITU two major communication standards organizations, have proposed two major application scenarios for the space-based satellite Internet.
  • 2Large-scale Internet of Things There is also a lot of market space in high-density population gathering areas including New York, London, Beijing, and Shanghai. China's 4G network construction is very fast. 3 million of the world's 4 million base stations are located in China, but everyone still finds that the network coverage on intercity expressways and some small areas in large cities is insufficient, and the delay may reach several hundred milliseconds Even ten seconds. For small-scale Internet of Things, this delay has little impact, but for giant Internet of Things with tens of thousands of users and tens of millions of users, once a long delay occurs, it will lead to information transmission. There is a huge problem with the synchronization of the Internet of Things, which leads to the collapse of the entire Internet of Things network
  • Satellite Internet is an important infrastructure promoter to promote human intelligence in the future. It is also because of this that the two major communication standards organizations, CTPP and ITO, propose to promote the formulation of standards for the satellite Internet of Things. They call satellite Internet NGN (Non-Ground Network) to promote the integration of satellite Internet and terrestrial network, which is also likely to appear in the future - the direction of 6G.
  • NGN Non-Ground Network
  • the second step is to launch 4 service test satellites to form a small constellation to allow users to have a preliminary business experience;
  • the third step is to realize the network operation of all 156 satellites on an orbit 1,000 kilometers away from the ground to build a global satellite-borne broadband Mobile Internet network to achieve undifferentiated global coverage of the network.
  • Hongyun Engineering In December 2018, my country's first Hongyun engineering technology verification satellite was successfully launched into orbit, and completed function and performance tests under different weather conditions, different carriers, and different business scenarios, and successfully realized web browsing, WeChat sending, and video chat. , HD video on demand and other typical Internet services.
  • Hongyun Engineering will launch four more business test satellites to complete regional coverage through networking. Subsequently, the first application demonstration system of Hongyun Project will also be put into use. It is foreseeable that after the completion of the Hongyun project, it will integrate the advantages of communication, navigation and remote sensing integration, global coverage, and autonomous and controllable systems to achieve extremely low communication delay, extremely high frequency reuse rate, and a truly global Covering applications to meet the needs of Internet access in China and underdeveloped areas of the Internet. At the same time, it will also play a great role in promoting industrial applications such as emergency communications, sensor data collection, industrial Internet of Things, drones, and autonomous driving.
  • the NGN non-terrestrial network can communicate with existing networks such as PSTN, ISDN and GSM.
  • the existing telecommunication network has a huge scale, and NGN can communicate with the existing network through gateways and other equipment to protect the existing investment.
  • NGN also supports existing terminals and IP smart terminals, including analog telephones, fax machines, ISDN terminals, mobile phones, GPRS terminals, SIP terminals, H248 terminals, MGCP terminals, Ethernet telephones via PC, cable modems, etc.
  • Multimedia One of the fastest growing features in China is the multimedia feature. At the same time, the multimedia feature is also the most basic and obvious feature of the space-based Internet.
  • the non-terrestrial NGN network has an open and standard interface, which can quickly provide users with a variety of customized services.
  • Virtual business will virtualize personal identity, contact information, and even residence. Users can use virtual services such as personal numbers and number portability to realize communication methods at any time and anywhere.
  • the communication terminals of non-terrestrial NGN have the characteristics of intelligence and diversification. The combination of network services and terminal characteristics can provide more intelligent services for users.
  • the space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a mesh network that uses a small platform to route the inter-satellite network of microwave links to provide data connections. (Future 6G)
  • Hongyun Engineering will complete the business test system in 2020.
  • my country will deploy and operate the entire constellation, build a space-based broadband Internet consisting of 156 satellites, and form a communication, navigation, and remote sensing integrated information system that focuses on low-orbit broadband communication, and has the ability to enhance navigation and support real-time remote sensing. "At that time, whether we are in the desert, the ocean or on a plane, we will be able to enjoy the same Internet speed and service experience as at home.
  • Hongyun Project has become the world's first low-orbit Ka broadband communication system, and has adopted technologies such as broadband inter-satellite communication, on-satellite broadband routing, and multi-channel phase-shifting chips for the first time in the world.
  • the broadband satellite communication terminal is the smallest in size, power consumption, and weight. lightest
  • S2.1 5G+ space-based Internet uses semiconductor silicon as the electronic phased array technology, and also has a receiving and transmitting array on a wafer of several centimeters to cover users with spot beams.
  • a common configuration is to use a CMOS data converter with high performance SiGe BiCMOS IF to mmWave conversion.
  • Beamforming can be implemented using a variety of techniques, depending on system requirements
  • the selection of power amplifier technology is based on comprehensive consideration of the required transmitter power, antenna gain (number of elements) and the RF power generation capability of the selected technology.
  • the optimal antenna size is between 128 and 256 elements, with lower numbers achieved with GaAs power amplifiers and larger numbers with all-silicon beamforming RF IC-based technology.
  • Mobile user equipment mobile phones
  • CMOS complementary metal-oxide-semiconductor
  • This type of radio will need to be highly integrated and power efficient to meet the demands of portable devices.
  • Local base stations (small cells) and consumer end equipment (removable power supplies) have similar requirements, involving a range of technologies from CMOS with low-end transmitter power requirements to higher-end SiGe BiCMOS.
  • Mid-range base stations are well suited for SiGe BiCMOS technology, enabling compact form factors.
  • various technologies can be applied, depending on the trade-off between antenna size and technology cost.
  • SiGe BiCMOS can be applied in the 60dBm EIRP range, GaAs or GaN power amplifiers are more suitable for higher power.
  • S2.2 uses the phased array and multi-antenna technology described in SI to realize the 5G standard millimeter-wave low-earth orbit Internet constellation with beam control, and the combination with NB-ioT (Narrowband Cellular Internet of Things)
  • NB-iot can solve the abundance demand in 5G communication and connect countless smart terminals; if there is the support of satellite constellation in breadth, many application scenarios can be realized.
  • the low-orbit constellation is located in low-Earth orbit, only a few hundred kilometers from the ground, and the delay fully meets the equipment requirements.
  • the 5G standard-based millimeter-wave low-orbit constellation and NB-ioT, one for wide-area network connection and one for low-power device connection between users, can be described as complementary advantages.
  • 3D-MIMO can achieve accurate three-dimensional beamforming, achieve better interference suppression and spatial multi-user multiplexing capabilities, and is an effective means to improve system capacity and transmission efficiency. Therefore, 3D-MIMO has also become the core technology of 4G evolution and 5G.
  • 3D-MIMO uses more transceiver channels. If the "BBU+RRU+antenna" architecture is still maintained, there are two problems.
  • the increase in the number of transceiver channels requires more feeder connections between the antenna and the RRU, which will bring great trouble to the actual network layout and increase the time for equipment installation. The more feeders, the more prone to errors.
  • the integration of the antenna and the RRU can solve this problem well, not only eliminating the feeder, but also eliminating the loss caused by the feeder (Architecture 1).
  • the increase in the number of channels also increases the bandwidth requirement for the CPRI interface between the RRU and the BBU, thereby increasing the cost of the fiber.
  • one method is to move some functions of the BBU up (Architecture 2), and the other method is to further integrate the BBU, RRU and antenna together to form an integrated station type (Architecture 3).
  • architecture 2 can reduce the bandwidth requirement of the CPRI interface
  • the interface between the BBU and the RRU needs to be redefined.
  • Architecture 3 directly cancels the CPRI interface.
  • the higher integration level will make the future network layout and rack station more convenient and fast, but it also puts forward higher requirements for the design of equipment size, weight and heat dissipation. Beam steering, the application of multi-antenna electronic phased array technology is the key to solving this problem:
  • beam steering With one or both ends of the system moving at the same time, it has proven to be extremely difficult to transmit the massive amounts of data needed to exert the effective performance of the mobile Internet of Things.
  • a technique called "beam steering” will play a key role. Instead of transmitting broadband wireless data signals in all directions, beam-steering technology sends the data to the specific user location that needs the data. This saves power, enables more users to obtain high-bandwidth wireless signals, and prevents signals from interfering with each other.
  • Step 1 Identify and locate the Mobile IoT sensor module; determine where its various endpoints are located.
  • Step 2 Calculate how and where to form the wireless narrow beam pattern so that the precise direct signal can only be sent to the desired endpoint antenna.
  • Step 3 Set up communication signals to endpoints.
  • cloud services can use Hongyun series satellites.
  • Existing cloud computing will be limited by fixed physical space in any case, but space computing is different, because with the integrated network of heaven and earth, all terminals It can be used to achieve network control.
  • the millimeter-wave low-earth orbit Internet constellation based on the 5G standard, combined with NB-ioT (Narrowband Cellular Internet of Things), 5G's low-latency, high-reliability, and space-based low-orbit low-power, low-power, high-connection sky-earth interconnection.
  • NB-ioT Nearband Cellular Internet of Things
  • the system will be built into a spatial information network infrastructure with seamless global coverage, which can provide Internet transmission services for various terminals such as ground fixed, hand-held mobile, vehicle-mounted, ship-borne, and air-borne.
  • seamless global coverage can provide Internet transmission services for various terminals such as ground fixed, hand-held mobile, vehicle-mounted, ship-borne, and air-borne.
  • the communication guarantee capability of the combination of wide and narrowband Through such a seamless global coverage system, any person or any object anywhere on the earth can achieve information interconnection at any time.
  • IoT access serving low-energy miniaturized IoT terminals, focusing on developing new industrial needs such as environmental monitoring, ocean logistics, hazardous chemicals monitoring, traffic management, and smart oceans;
  • 4Hot information push make full use of the characteristics of satellite wide area coverage, realize the real-time broadcast and push of hot focus information such as cultural publicity, disaster warning, public safety warning, weather broadcast, headline news broadcast, traffic broadcast;
  • the standardized data interface of the consensus mechanism realizes the integration of "multi-chain-relay chain-cross-chain", traffic transmission, data interaction, and mixed storage.
  • the multi-chain system replaces the single chain, and the status of each chain is completely equal, and it is composed of instances of independent consensus systems that are logically isolated as much as possible. They work in parallel to share the throughput, calculation, and storage pressure of the entire network, and share the state of the entire network. maintenance work.
  • a networked value flow resource pool will be formed, and those assets and flows scattered in various chains will be freely exchanged, flowed and valued through the high-speed network.
  • the iLAB-x.com consensus mechanism originates from the experimental space - the national virtual simulation experiment teaching project sharing platform, which has its own intellectual property rights. Announcement on “Announcement of 2019 National Virtual Simulation Experiment Teaching Project Application Materials and Evaluation of Network Users” , Jiaogao Secretary Letter [2019] No. 33 "Notice of the Higher Education Department of the Ministry of Education on Carrying out the Certification of the National Virtual Simulation Experiment Teaching Project in 2019" has become the national virtual simulation experiment teaching project sharing technical interface specification.
  • the consensus mechanism adopting a two-layer distributed storage structure that stores data hash values on the chain and cloud computing to store data; uses a hash algorithm to solve the security verification problem of API interface callers; uses AES256 algorithm and key-related hash operations on messages
  • the authentication code is used to identify the user to avoid secondary login. After identification, the user's operating status and the data generated by the relevant supplier are automatically sent back to the shared trading platform; the time stamp is used to solve the data exchange format and the security of data transmission; the root chain is used to give priority to
  • the consensus mechanism performs network sharding and transaction sharding, and realizes the upload service of attachments from outside the chain to the inside of the chain.
  • the consensus mechanism has excellent video streaming performance and standardized interfaces for IoT terminal devices.
  • Crypto World provides smart contract development interfaces to third parties to provide services, including but not limited to video, VR and AR, games, commodity trading, etc.
  • the project party or developer can determine the projects that can be operated by calling the smart contract interface, and can also realize self-operation and agency operation and obtain operational benefits by selecting different smart contract combinations.
  • CWV's smart contracts provide project parties or users with the opportunity to choose independently, and obtain corresponding benefits through different business models.
  • the virtual machine is deployed in the cloud computing method, and the Turing complete two-layer architecture, one layer is the shard (ie, the sub-chain layer), and the other is the root chain, which is the contract virtual machine. It can provide higher performance guarantee and provide technical guarantee for the upper-layer Dapps application.
  • the cluster node acts as a super node and can store the complete ledger
  • a node can also keep only a part of the ledger (for example, only record the ledger of a single shard). In this case, it must rely on other participants in the network to help determine the validity of the remaining shard data and/or root chain data. Decentralization is guaranteed.
  • a Active health check This includes monitoring network link status, in-depth health check on server application status, and diversified health check methods for smart contracts. Accurate judgment can be made according to the available situation, so as to determine whether the dual center needs to be handed over, and whether it is an overall handover or a partial resource handover.
  • a load sharing strategy can be formulated based on different factors such as user source region, delay situation, used operator, and load weight, so as to realize business distribution among multiple nodes.
  • the contract can provide one-to-one, one-to-many, and many-to-many address translation, flexibly adapting to the needs of business switching.
  • the root chain cluster node method realizes the function of a super node and avoids centralization.
  • the cluster node supports a complete account book and is also a mesh network. It is completely consistent in function and equal in status. They work in parallel to share the throughput of the entire network. , calculation, storage pressure, and share the maintenance work of the entire network state; such as access, www.ilab-x.com initiates an NS request.
  • Step 1 First initiate the www.ilab-x.com domain name to the local dns of the operator; Step 2.
  • the operator's ENS server finds the ENS primary and secondary servers through recursion; Steps 3 and 4: Accept the requested root chain
  • the smart contract first queries whether there is a proximity entry of the Local DNS locally, and if it exists, it directly returns the fastest server address to the local DNS. If not present, the query of the ENS resolver localDNS of the root chain smart contract.
  • Step 5. resolves the two nodes to Probe LocalDNS respectively. For example, the RTT time for the smart contract on the ISP1 side to query the LocalDNS is 150ms. However, the RTT time of the GTM query on the ISP2 side for the same LocalDNS is 300ms.
  • the localDNS should be nearness table records are formed in the node.
  • the root chain smart contract After receiving the LocalDNS request, the root chain smart contract returns the corresponding DATAcenter WEB server address according to the proximity table of the system. Step 6. After the user's lical DNS obtains the address, the changed address is returned to the user; the user initiates access to the website; the cluster nodes provide multiple Internet interfaces for Internet services, and the Beijing node A includes the telecommunications exit and the China Unicom exit; the Beijing node B includes the telecommunications Exit, Unicom Exit and Mobile Exit; Wuhan Node C contains Telecom Exit.
  • the Southern Telecom customers are directed to the Wuhan Node Telecom Export.
  • Direct Northern Telecom customers to the telecom exit of the Beijing node the selection of the two data centers of the same operator is based on RTT, and reverse detection is performed on the client at each node, and selection is made according to the detection response results.
  • Customized writing of D contract custom scripts can realize customized traffic traction for different services, such as emergency scheduling and traction of sudden traffic for cluster nodes, optimal control of outbound traffic, and dynamic selection of different SNAT/SSL profiles according to business scenarios;
  • E Preset takeover sequence Through the switching and takeover between cluster nodes, the traction business flow is redistributed among data centers. More importantly, the switching between cluster nodes can predefine the takeover sequence, so that multiple The operation and maintenance of the live center is manageable and predictable, and conforms to the distribution of the data center to minimize the delay and impact. This predefinable takeover sequence has been proven in practice in the industry.
  • Operation and maintenance automation considerations including interaction with systems and applications, including monitoring and response. Since there are many links and processes involved in cluster nodes, in order to better operate and maintain, a large number of automated scripts can be used, and at the same time, the contract interface can be fully utilized to achieve one-click DC switching, one-click DB switching, automatic configuration collection and upload, Configuration compliance inspection, single-node configuration correlation extraction, multi-node configuration consistency comparison, contract application unified view generation, etc., and integrated with the unified operation and maintenance management platform to improve the operation and maintenance level and operation and maintenance in the multi-node environment ability.
  • the first requirement of the hybrid chain the interconnection of the private chain and the public chain.
  • Private chains are inherently private, with authenticated parties limiting access to the blockchain to only their users. This is typically a network of business partners or connected through their operations and benefiting from a shared tamper-proof database.
  • CBA China Banking Industry Agreement
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • the advantages of a private chain are high efficiency, fast processing speed, and the ability to adapt to complex application scenarios. In addition, it has good controllability and can meet regulatory requirements without forking.
  • Typical application scenarios are cross-border payment business.
  • an international trade company has established its own private chain to provide commercial services by putting commodities on the chain.
  • it also conducts cross-border payments through public chains such as XRP and other institutions.
  • the first requirement of the hybrid chain the combination of a private permissioned chain and a public chain.
  • private blockchains are private in nature, with authenticated parties limiting access to the blockchain to only their users. This is typically a network of business partners or connected through their operations and benefiting from a shared tamper-proof database.
  • CBA China Banking Industry Agreement
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • HSBC High Efficiency Interbank Transaction Blockchain Platform
  • a private license chain Obviously, the advantages of a private license chain are high efficiency, fast processing speed, and the ability to adapt to complex application scenarios. In addition, it has good controllability and can meet regulatory requirements without forking.
  • private permissioned chains are, after all, private, collective, and centralized.
  • the public chain project has formed a huge existence.
  • the private license chain must be combined with the public chain to ensure the integrity of the business chain.
  • Smart API Not only supports the interconnection of single chains and public chains, but also supports interoperability between cross chains and even alliance chains.
  • the contract will set up public chains, private chains or alliance chains for different purposes, based on different requirements for performance, security and application scenarios, and then graft applications in different industries. For example, a communication public chain that supports high concurrency, a payment alliance chain that focuses on security, and a notary network system based on legal deposit.
  • the first data packet or the second data packet includes asset value transfer data, It also includes data information that needs to be stored, exchanged, and modified on the chain. While transferring value, data can also be stored, exchanged, and modified on the chain. That is to say, while the live content is uploaded, it can be accompanied by the transfer of asset value, expanding the commercial application scenarios
  • Blockchain technology can provide a complete set of solutions for tracking news sources, so as to achieve media source authentication.
  • the content collected and written by blockchain technology cannot be modified privately. Even if the data is modified, its historical records can be traced back; the news published using "Kai News" is encrypted and shared to multiple personal computers, third-party organizations It is difficult to tamper with.
  • Digital copyright Blockchain technology can accurately track the copyright of news works, film and television works, Internet works, and music works with the digital signature of the synchronized timestamp of the National Time Service Center, and completely record news works from the three links of right confirmation, right use, and rights protection. Copyright transfer process. Using artificial intelligence and blockchain reinforcement technology, it provides a series of services such as copyright registration, sub-licensing contract filing and registration, copyright retrieval, copyright transaction, royalty settlement, infringement reporting and rights protection appeal.
  • Communication effect statistics solve the problems of opaque and biased advertising and marketing effects in the media industry, such as click cheating, etc., to help advertisers and media improve operational efficiency and accuracy.
  • Quality evaluation mechanism with the participation of government, industry, enterprises, colleges, etc.: data storage, management and big data mining, graphical display, comprehensive data analysis, analysis of status data collection, and confidence in the support of each analysis result
  • the calculation of degree and divergence and the analysis of isolated points enlarge the marketing system from point to line, to plane, realize intelligent scene marketing, can meet the service consumers more conveniently, and truly realize the reconstruction of the core capabilities of real business.
  • Lifelong education The rural distance education system and the digital campuses of various vocational colleges are interconnected through data to integrate the interactivity of computers, the distribution of communications, and television. Realize "resource integration, content integration, publicity integration, and interest integration”.
  • Blended teaching teaching and research applications, etc., and can meet the application of different clients, including PC, notebook, IOS mobile terminal, ANDROID mobile terminal and other terminals.
  • the decentralized and distributed design of blockchain can realize multi-level platform deployment and support unlimited level platform access and separation. That is to say, a school can directly carry out a single deployment, and only a simple configuration can realize the integration of multiple schools with district-level platforms, municipal-level platforms, and provincial-level platforms.
  • the merged school wants to separate from the combined resource platform, it can also configure the website to separate A kind of "online” + “offline” teaching that combines the advantages of online teaching and traditional teaching.
  • Blended teaching is to move the traditional classroom lectures forward through the online form of micro-videos, give students sufficient study time, and let each student walk into the classroom with a better knowledge base as much as possible.
  • This embodiment provides a device, the device includes: one or more processors; a memory for storing one or more programs, when the one or more programs are executed by the one or more processors , causing the one or more processors to perform the method as described above.
  • this embodiment provides a storage medium storing a computer program, and when the program is executed by a processor, the method described in Embodiment 1 above is implemented.
  • FIG. 1 is a schematic structural diagram of a device according to an embodiment of the present invention.
  • the present application also provides a device 500, comprising one or more central processing units (CPUs) 501, which can operate according to a program stored in a read-only memory (ROM) 502 or Various appropriate actions and processes are executed from the program loaded into the random access memory (RAM) 503 from the storage section 508 .
  • ROM read-only memory
  • RAM random access memory
  • various programs and data necessary for the operation of the device 500 are also stored.
  • the CPU 501 , the ROM 502 , and the RAM 503 are connected to each other through a bus 504 .
  • An input/output (I/O) interface 505 is also connected to bus 504 .
  • the following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, etc.; an output section 507 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc.; a storage section 508 including a hard disk, etc. ; and a communication section 509 including a network interface card such as a LAN card, a modem, and the like. The communication section 509 performs communication processing via a network such as the Internet.
  • a drive 510 is also connected to the I/O interface 505 as needed.
  • a removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is mounted on the drive 510 as needed so that a computer program read therefrom is installed into the storage section 508 as needed.
  • the method described in any of the above embodiments may be implemented as a computer software program.
  • embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing the method described in any of the above-described embodiments.
  • the computer program may be downloaded and installed from the network via the communication portion 509 and/or installed from the removable medium 511 .
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be a computer-readable storage medium included in the apparatus of the foregoing embodiment; A computer-readable storage medium in a device.
  • the computer-readable storage medium stores one or more programs that are used by one or more processors to perform the methods described herein.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions.
  • the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
  • each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations can be implemented by dedicated hardware-based systems that perform the specified functions or operations , or can be implemented by a combination of dedicated hardware and computer instructions.
  • the units or modules involved in the embodiments of the present application may be implemented in a software manner, and may also be implemented in a hardware manner.
  • the described units or modules may also be provided in the processor, for example, each of the units may be a software program provided in a computer or a mobile smart device, or may be a separately configured hardware device. Wherein, the names of these units or modules do not constitute limitations on the units or modules themselves under certain circumstances.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

Disclosed are a network convergence method and a networking method for network convergence, and a device and a storage medium, wherein same belong to the technical field of blockchains. The networking method for network convergence comprises: analyzing one or more first transactions passing verification; determining whether the first transaction is a transaction including a first operator network element node requesting networking; and if so, according to first transaction content at least comprising a consensus method required by the first operator network element node requesting networking and the identity of the first operator network element node requesting networking, performing, on the basis of NFV/SDN technology, network slicing on the first operator network element node requesting to join. Therefore, rapid networking can be achieved, secure isolation, network convergence and resource sharing are implemented, and access speed and experience are improved.

Description

一种网络融合及其组网方法、设备及存储介质A kind of network fusion and its networking method, equipment and storage medium 技术领域technical field
本发明涉及区块链技术领域,尤其涉及一种网络融合及其组网方法、设备及存储介质。The present invention relates to the technical field of blockchain, and in particular, to a network fusion and its networking method, equipment and storage medium.
背景技术Background technique
传统的手机操作系统,一旦接入运营商网络,会虚拟出一个网络接口来,并在这个接口上配置由核心网分配的IP地址。当然,传统的手机可以通过多个APN方式,或者单个APN多PDP Context方式,同时激活多个连接(对应多个接口),每个接口上分配一个IP地址,但是这些接口上的IP地址,必须不同。如果相同,手机将拒绝接入网络。传统的手机多个APN的连接方式,会产生多个ip地址冲突。The traditional mobile phone operating system, once connected to the operator's network, will virtualize a network interface, and configure the IP address assigned by the core network on this interface. Of course, traditional mobile phones can activate multiple connections (corresponding to multiple interfaces) at the same time through multiple APNs, or a single APN with multiple PDP Contexts, and assign an IP address to each interface, but the IP addresses on these interfaces must be different. If they are the same, the phone will refuse to access the network. The traditional connection method of multiple APNs of mobile phones will generate multiple IP address conflicts.
区块链网络系统因其安全性、不易篡改等技术效果被在各类场景下引用,以解决各类场景下资源、信息或数据等易被修改的技术问题,但因其共识过程较为耗时,在实际实施过程中,速度较慢,良好运行的技术方案少之又少。The blockchain network system is used in various scenarios because of its technical effects such as security and not easy to tamper with, to solve technical problems such as resources, information or data that are easily modified in various scenarios, but its consensus process is time-consuming. , in the actual implementation process, the speed is slow, and there are few technical solutions that work well.
现有的通信服务领域中几大运营商之间互相独立,三网融合一直是目前国内通信领域的难点,存在硬件基础设施改造成本高,软件网络系统实现困难等问题。In the existing communication service field, several major operators are independent of each other, and the integration of three networks has always been a difficult point in the domestic communication field.
如果全国只有一张网,宽带越宽,速度就越快。然而,我国的互联网网络不仅一家提供,电信、联通占大头,移动占一小部分,另外,有线电视运营商也提供上网服务。这时,不同网络运营商之间的互联互通就是最大瓶颈,仅单独增加一个供应商的带宽,不能解决问题。如何建立数据共享方案,实现数据可用不可见,包括怎么进行数据的交互,在区块链平台缺乏统一标准是目前三网融合题是行业公认的瓶颈。If there is only one network in the whole country, the wider the broadband, the faster the speed. However, my country's Internet network is not only provided by one company. Telecom and China Unicom account for the majority, and mobile accounts for a small part. In addition, cable TV operators also provide Internet access services. At this time, the interconnection between different network operators is the biggest bottleneck, and only increasing the bandwidth of one provider alone cannot solve the problem. How to establish a data sharing scheme to make data available and invisible, including how to interact with data, the lack of a unified standard on the blockchain platform is the current industry-recognized bottleneck for the integration of the three networks.
全球共有400万个基站,其中300万个基站在中国,但大家依然会发现高速公路上、大城市的一些小区域网络覆盖不足,延时会达到几百毫秒甚至十几秒,对于物联网来说这会导致传输的同步性出现巨大的问题。There are 4 million base stations in the world, 3 million of which are in China, but everyone still finds that the coverage of some small areas on highways and big cities is insufficient, and the delay will reach hundreds of milliseconds or even ten seconds. Saying this would cause huge problems with the synchronization of the transfers.
发明内容SUMMARY OF THE INVENTION
1.发明要解决的技术问题1. The technical problem to be solved by the invention
为了克服上述技术问题,本发明提供了一种网络融合及其组网方法、设备及存储介质,可以快速组网,实现安全隔离,网络融合,资源共享,提升访问速度和体验。In order to overcome the above technical problems, the present invention provides a network fusion and its networking method, equipment and storage medium, which can quickly form a network, realize security isolation, network fusion, resource sharing, and improve access speed and experience.
2.技术方案2. Technical solutions
为解决上述问题,本发明提供的技术方案为:In order to solve the above-mentioned problems, the technical scheme provided by the present invention is:
一种网络融合的组网方法,包括:解析验证通过的一笔以上的第一交易,判断第一交易是否为包含有第一运营商网元节点请求组网的交易,若是,则根据至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易内容,基于NFV/SDN技术对请求加入的第一运营商网元节点进行网络分片,将请求组网的第一运营商网元节点分配至第一网络,并向第一运营商网元节点发送将请求组网的第一运营商网元节点分配至第一网络的消息;接收请求组网的第一运营商网元节点的响应消息;判断请求组网的第一运营商网元节点是否同意分配至第一网络;若是,则将第一交易,及包含有将请求组网的第一运营商网元节点分配至第一网络的交易打包上链;若否,则将第一交易,及包含有将请求组网的第一运营商网元节点拒绝分配至第一网络的交易打包上链。A networking method for network integration, comprising: parsing more than one first transaction that has passed the verification, and determining whether the first transaction is a transaction that includes a first operator's network element node requesting networking; The consensus method required by the first operator network element node requesting networking, and the first transaction content including the identity of the first operator network element node requesting networking, based on the NFV/SDN technology for the first operator network requesting to join. The element node performs network fragmentation, assigns the first operator network element node requesting networking to the first network, and sends a message to the first operator network element node to assign the first operator network element node requesting networking to the first network element node. a message from a network; receive a response message from the first operator's network element node requesting networking; determine whether the first operator's network element node requesting networking agrees to be allocated to the first network; if so, transfer the first transaction, and Including the transaction of allocating the first operator's network element node requesting networking to the first network is packaged and uploaded to the chain; if not, the first transaction and the first operator's network element node containing the request for networking are rejected. Transactions allocated to the first network are packaged and uploaded to the chain.
可选的,所述网络分片根据不同的需求,对物理基础设施或底层网络服务和功能的实例化,形成一个以上的第一运营商网元节点,根据所述组网方法进行组网,形成一个以上的第一网络。Optionally, the network fragmentation instantiates physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method, More than one first network is formed.
可选的,一个所述第一网络对应一个IP协议栈实例。Optionally, one first network corresponds to one IP protocol stack instance.
一种网络融合的组网方法,根据以上所述的一种网络融合的组网方法,包括:向根链发送至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易;接收根链发来的将请求组网的第一运营商网元节点分配至第一网络的消息;向根链发送同意或不同意分配至第一网络的响应消息。A networking method for network convergence, according to the above-mentioned networking method for network convergence, comprising: sending to a root chain at least a consensus method required by a first operator network element node requesting networking, a request for networking The first transaction including the identity of the first operator's network element node; receiving a message from the root chain that assigns the first operator's network element node requesting networking to the first network; sending an agreement or disagreement to the root chain A response message distributed to the first network.
一种网络融合方法,根据以上所述的一种网络融合的组网方法,包括:接收第一运营商网元节点发来的请求利用不同于第一运营商的第二运营商的资源的第一请求交易,第一运营商网元节点身份验证通过后,则将第一转换合约接口发送至第一运营商网元节点;接收第一运营商网元节点访问和退出第一转换合 约接口的消息;向第一运营商网元节点发送第一运营商网元节点访问和退出第一转换合约接口的基本信息;收到第一运营商网元节点发来的确认消息后上链;其中,所述根链上设置一个以上的第一转换合约,所述第一转换合约用于将所述第二运营商的资源访问和利用接口转换成第一运营商网元节点可访问和利用的接口方式;所述第一运营商网元节点向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;接收根链发来的访问和退出第一转换合约接口的基本信息;核实访问和退出第一转换合约接口的基本信息,并反馈给根链。A method for network convergence, according to the above-mentioned networking method for network convergence, comprising: receiving a request from a network element node of a first operator to utilize resources of a second operator different from the first operator. When a transaction is requested, after the identity verification of the first operator's network element node is passed, the first conversion contract interface is sent to the first operator's network element node; the first operator's network element node accesses and exits the first conversion contract interface message; send the basic information of the first operator's network element node accessing and exiting the first conversion contract interface to the first operator's network element node; upload the chain after receiving the confirmation message sent by the first operator's network element node; wherein, More than one first conversion contract is set on the root chain, and the first conversion contract is used to convert the resource access and utilization interface of the second operator into an interface accessible and usable by the network element node of the first operator method; the first operator's network element node sends a first request transaction to the root chain that requests to use the resources of a second operator different from the first operator; if the first operator's network element node passes the identity verification, receive Go to the first conversion contract interface; access the first conversion contract interface, and send a message to the root chain to access the first conversion contract interface; exit the first conversion contract interface, and send a message to the root chain to exit the first conversion contract interface; receive Basic information of accessing and exiting the first conversion contract interface sent from the root chain; verifying the basic information of accessing and exiting the first conversion contract interface, and feeding it back to the root chain.
可选的,所述第一运营商网元节点身份验证的过程,包括:对第一运营商网元节点待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对,若一致,则通过所述加密密钥对第一运营商网元节点身份信息的密文,通过AES256算法解密得到第一运营商网元节点身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对不一致,则第一运营商网元节点身份验证不通过;相应地,所述第一运营商网元节点身份加密的过程为:通过加密密钥将第一运营商网元节点身份信息的明文根据AES256算法得到第一运营商网元节点身份信息的密文;对加密密钥进行哈希运算后得到加密密钥哈希值,将加密密钥哈希值及第一运营商网元节点身份信息的密文在根链中上链。Optionally, the first operator's network element node identity verification process includes: performing a hash operation on an encryption key to be verified by the first operator's network element node to obtain a hash value of the encryption key to be verified, Compare with the hash value of the encryption key on the root chain, if they are consistent, decrypt the ciphertext of the identity information of the first operator's network element node through the encryption key and obtain the first operator's network element node through AES256 algorithm decryption The plaintext of the identity information, the identity verification of the access party is passed; if the hash value of the encryption key to be verified is inconsistent with the hash value of the encryption key on the root chain, the identity verification of the first operator's network element node fails; Correspondingly, the process of encrypting the identity of the first operator's network element node is: using the encryption key to obtain the ciphertext of the first operator's network element node identity information from the plaintext of the first operator's network element node identity information according to the AES256 algorithm. ; After performing hash operation on the encryption key, the encryption key hash value is obtained, and the encryption key hash value and the ciphertext of the identity information of the first operator's network element node are uploaded in the root chain.
可选的,所述上链包括将上链内容保存至云计算或雾计算存储空间中。Optionally, the on-chain includes saving the on-chain content in a cloud computing or fog computing storage space.
可选的,所述根链与版权注册机构通过第一转换合约接口进行数据交互;所述数据交互的方法包括:接收第一运营商网元节点发来的请求注册数字版权证书的第二请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求注册数字版权证书的第二请求交易;若符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的包含有DCI的数字版权证书,转发给第一运营商网元节点;若不符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的修改注册数字版权材料的通知,或不授予数字版权证书的通知,转发给第一运营商网元节点;或,接收第一运营商网元节点发来的请求验证数字版权证书DCI的第三请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求验证数字版权证书DCI的第三请求交易;若数字版权注册机构验证通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证通过的通知,转发给第一运营商网元节点;若数字版权注册机构验证不通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证不通过的通知,转发给第一运营商网元节点,版权保护机构和知识产权法院认可的证据平台存证。Optionally, the root chain and the copyright registration agency perform data exchange through a first conversion contract interface; the data exchange method includes: receiving a second request for registering a digital copyright certificate from a first operator's network element node Transaction, after the identity verification of the first operator's network element node is passed, the root chain sends a second request transaction for the first operator's network element node to request the registration of the digital copyright certificate to the digital rights registration agency through the first conversion contract interface; According to the review regulations of the registration authority, the root chain receives the digital copyright certificate containing DCI sent by the digital copyright registration authority and forwards it to the first operator's network element node; if it does not meet the review regulations of the digital copyright registration authority, the root chain receives the digital copyright registration authority. The notice sent by the organization to modify the registered digital copyright material, or not to grant the digital copyright certificate, is forwarded to the first operator's network element node; or, receiving the request to verify the digital copyright certificate DCI sent by the first operator's network element node The third request transaction, after the identity verification of the first operator's network element node is passed, the root chain sends the third request transaction of the first operator's network element node requesting the verification of the digital rights certificate DCI to the digital rights registration authority through the first conversion contract interface; If the verification of the digital rights registration authority is passed, the root chain receives the notification that the DCI verification of the digital copyright certificate is passed by the digital rights registration authority, and forwards it to the first operator's network element node; if the verification of the digital rights registration authority fails, the root chain receives the notification The notice that the DCI verification of the digital copyright certificate is not passed by the digital copyright registration agency is forwarded to the first operator's network element node, the copyright protection agency and the evidence platform recognized by the intellectual property court.
一种网络融合方法,根据以上任一项所述的一种网络融合方法,包括:向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;接收根链发来的访问和退出第一转换合约接口的基本信息;核实访问和退出第一转换合约接口的基本信息,并反馈给根链。A method for network fusion, according to any one of the above-mentioned methods for network fusion, comprising: sending a first request transaction to a root chain for requesting to utilize resources of a second operator different from the first operator; If the identity verification of the operator's network element node passes, the first conversion contract interface is received; the first conversion contract interface is accessed, and a message for accessing the first conversion contract interface is sent to the root chain; the first conversion contract interface is exited, and the root chain is sent to the root chain. Send the message of exiting the first conversion contract interface; receive the basic information of accessing and exiting the first conversion contract interface from the root chain; verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
可选的,所述第一转换合约接口还用于与版权注册机构进行数据交互,所述与版权注册机构进行数据交互的方法为:向根链发送请求注册数字版权证书所需的材料的第二请求交易;若符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的包含有DCI的数字版权证书;若不符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的修改注册数字版权材料的通知,或不授予数字版权证书的通知。Optionally, the first conversion contract interface is also used for data interaction with the copyright registration authority, and the method for data interaction with the copyright registration authority is: sending the first request to the root chain of the materials required for registering the digital copyright certificate. 2. Request transaction; if it complies with the review regulations of the digital copyright registration agency, receive the digital copyright certificate containing DCI sent by the digital copyright registration agency forwarded by the root chain; A notice sent by a copyright registry to modify registered digital copyright material, or not to grant a digital copyright certificate.
一种网络融合方法,根据以上任一项所述的一种网络融合方法,包括:向第一运营商网元节点发送利用不同于第一运营商的第二运营商的资源的请求;接收第一运营商网元节点发来的第一转换合约接口;访问第一转换合约接口,并通过第一运营商网元节点向根链发送访问第一转换合约接口的消息;退出第一转换合约接口,并通过第一运营商网元节点向根链发送退出第一转换合约接口的消息;接收通过第一运营商网元节点转发来的根链发来的访问和退出第一转换合约接口的基本信息;核实访问和退出第一转换合约接口的基本信息,并通过第一运营商网元节点反馈给根链;其中,接收到终端发来的利用不同于第一运营商 的第二运营商的资源的请求后,所述第一运营商网元节点向根链发送终端请求利用不同于第一运营商的第二运营商的资源的第一请求交易;若第一运营商网元节点及终端身份验证通过,则接收到第一转换合约接口并转发终端;接收并向根链发送终端访问第一转换合约接口的消息;接收并向根链发送终端退出第一转换合约接口的消息;接收根链发来的终端访问和退出第一转换合约接口的基本信息;接收并向根链反馈终端核实访问和退出第一转换合约接口的基本信息,进行上链。A method for network convergence, according to any one of the above-mentioned methods for network convergence, comprising: sending a request for utilizing resources of a second operator different from the first operator to a network element node of a first operator; A first conversion contract interface sent by an operator network element node; access the first conversion contract interface, and send a message for accessing the first conversion contract interface to the root chain through the first operator network element node; exit the first conversion contract interface , and send the message of exiting the first conversion contract interface to the root chain through the network element node of the first operator; receive the basic information of accessing and exiting the interface of the first conversion contract sent by the root chain forwarded by the network element node of the first operator information; verify the basic information for accessing and exiting the first conversion contract interface, and feed it back to the root chain through the first operator's network element node; After the resource is requested, the first operator's network element node sends a first request transaction for the terminal to request the use of resources of a second operator different from the first operator to the root chain; if the first operator's network element node and the terminal If the identity verification is passed, the first conversion contract interface is received and forwarded to the terminal; the message that the terminal accesses the first conversion contract interface is received and sent to the root chain; the message that the terminal exits the first conversion contract interface is received and sent to the root chain; The basic information of the terminal accessing and exiting the first conversion contract interface sent from the chain; receiving and feeding back to the root chain the basic information of the terminal verifying the access and exiting the first conversion contract interface, and uploading to the chain.
可选的,所述终端与第一运营商网元节点之间,以及第一运营商网元节点与根链之间,及第一运营商网元节点之间,终端之间均采用天基互联网、5G通信或星地通信。Optionally, between the terminal and the first operator's network element node, as well as between the first operator's network element node and the root chain, and between the first operator's network element node, the terminals use space-based networks. Internet, 5G communication or satellite-to-earth communication.
可选的,所述第一运营商网元节点为通信基站或卫星。Optionally, the first operator network element node is a communication base station or a satellite.
此外,本发明提供了一种设备,所述设备包括:一个或多个处理器;存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如以上所述的方法。Furthermore, the present invention provides an apparatus comprising: one or more processors; a memory for storing one or more programs, when the one or more programs are executed by the one or more processors When executed, the one or more processors are caused to perform a method as described above.
相应地,本发明提供了一种存储有计算机程序的存储介质,该程序被处理器执行时实现如以上任一项所述的方法。Correspondingly, the present invention provides a storage medium storing a computer program, and when the program is executed by a processor, the method as described in any of the above is implemented.
3.有益效果3. Beneficial effects
采用本发明提供的技术方案,与现有技术相比,具有如下有益效果:Adopting the technical scheme provided by the present invention, compared with the prior art, has the following beneficial effects:
(1)本申请实施例所述一种网络融合的组网方法的通信方式为MQTT。所述交易打包上链时,加入中科院国家授时中心的时间戳,以防止后期网络融合出现数据冲突。通过网络分片实现逻辑隔离,解决NFV/SDN网络切片安全隔离较低和部署较难的问题。(1) The communication mode of the networking method for network convergence described in the embodiment of the present application is MQTT. When the transaction is packaged and uploaded to the chain, the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration. Logic isolation is achieved through network slicing, which solves the problems of low security isolation and difficult deployment of NFV/SDN network slicing.
(2)本申请实施例所述一种网络融合方法,第一运营商网元节点访问和退出第一转换合约接口的基本信息,包括但不限于第一运营商网元节点访问第一转换合约接口的时间,第一运营商网元节点退出第一转换合约接口的时间;流量大小,频带占用时长,费用等内容;实现结算,资源共享,网络融合的过程;实现通信及数据和价值交换。(2) In the network integration method described in the embodiment of this application, the basic information of the first operator's network element node accessing and exiting the first conversion contract interface, including but not limited to the first operator's network element node accessing the first conversion contract The time of the interface, the time when the first operator's network element node exits the interface of the first conversion contract; the size of the traffic, the duration of the frequency band occupation, the cost, etc.; the process of realizing settlement, resource sharing, and network integration; realizing communication and data and value exchange.
附图说明Description of drawings
图1为本发明实施例提出的一种设备结构示意图。FIG. 1 is a schematic structural diagram of a device according to an embodiment of the present invention.
图2为本发明实施例提出的一种网络融合的组网方法的流程示意图之一。FIG. 2 is one of the schematic flowcharts of a networking method for network convergence proposed by an embodiment of the present invention.
图3为本发明实施例提出的一种网络融合的组网方法的流程示意图之二。FIG. 3 is a second schematic flowchart of a networking method for network convergence proposed by an embodiment of the present invention.
图4为本发明实施例提出的一种网络融合方法的流程示意图之一。FIG. 4 is one of the schematic flowcharts of a network fusion method proposed by an embodiment of the present invention.
图5为本发明实施例提出的一种网络融合方法的流程示意图之二。FIG. 5 is a second schematic flowchart of a network fusion method proposed by an embodiment of the present invention.
图6为本发明实施例提出的一种网络融合方法的流程示意图之三。FIG. 6 is a third schematic flowchart of a network fusion method proposed by an embodiment of the present invention.
具体实施方式detailed description
为进一步了解本发明的内容,结合附图及实施例对本发明作详细描述。In order to further understand the content of the present invention, the present invention will be described in detail with reference to the accompanying drawings and embodiments.
下面结合附图和实施例对本申请作进一步的详细说明。可以理解的是,此处所描述的具体实施例仅仅用于解释相关发明,而非对该发明的限定。另外还需要说明的是,为了便于描述,附图中仅示出了与发明相关的部分。本发明中所述的第一、第二等词语,是为了描述本发明的技术方案方便而设置,并没有特定的限定作用,均为泛指,对本发明的技术方案不构成限定作用。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。下面将参考附图并结合实施例来详细说明本申请。The present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for the convenience of description, only the parts related to the invention are shown in the drawings. The terms "first" and "second" mentioned in the present invention are provided for the convenience of describing the technical solutions of the present invention, and have no specific limiting effect. It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
实施例1Example 1
一种网络融合的组网方法,适用于作为网络融合的区块链系统的根链上的虚拟机,或集群节点,如图2所示,包括:A networking method for network fusion, suitable for virtual machines or cluster nodes on the root chain of the blockchain system as network fusion, as shown in Figure 2, including:
S101、解析验证通过的一笔以上的第一交易;S101, parsing and verifying more than one first transaction;
S102、判断第一交易是否为包含有第一运营商网元节点请求组网的交易;若是,则S102. Determine whether the first transaction is a transaction that includes a first operator's network element node requesting networking; if so, then
S103、根据至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易内容,基于NFV/SDN技术对请求加入的第一运营商网元节点进行网络分片,将请求组网的第一运营商网元节点分配至第一网络,并向第一运营商网元节点发送将请求组网的第一运营商网元节点分配至第一网络的消息;S103. According to the first transaction content including at least the consensus method required by the first operator's network element node requesting networking and the identity of the first operator's network element node requesting networking, based on NFV/SDN technology The first operator network element node performs network fragmentation, assigns the first operator network element node requesting networking to the first network, and sends the first operator network element node requesting networking to the first operator network element node. a message allocated by the meta node to the first network;
S104、接收请求组网的第一运营商网元节点的响应消息;S104. Receive a response message from the first operator's network element node requesting networking;
S105、判断请求组网的第一运营商网元节点是否同意分配至第一网络;若是,则S105. Determine whether the network element node of the first operator that requests networking agrees to be allocated to the first network; if so, then
S106、将第一交易,及包含有将请求组网的第一运营商网元节点分配至第一网络的交易打包上链;若否,则S106: Package and upload the first transaction and the transaction including the allocation of the first operator's network element node requesting networking to the first network; if not, then
S107、将第一交易,及包含有将请求组网的第一运营商网元节点拒绝分配至第一网络的交易打包上链。S107. Package and upload the first transaction and the transaction including the first operator's network element node requesting networking that refuses to be allocated to the first network.
网元指网络中的设备,如对于LTE架构来说,网元包括基站,除此外还有MME、SGW、PDN等。网元划分的粒度很多,根据用途可分为,物理网元,逻辑网元,等效网元数等。第一运营商中的第一是泛指,在此不对应特定的运营商名称,可根据实际应用需要而变换成相同或不同的运营商名称。本实施例所述的第一运营商网元节点,是指可作为区块链系统一个节点运行的网元,比如移动、联通或电信等运营商的基站、服务器、集群等;比如各运营商的雾计算节点、云计算中心节点和边缘计算节点等。The network element refers to the equipment in the network. For example, for the LTE architecture, the network element includes the base station, and in addition to the MME, the SGW, and the PDN. There are many granularities of network element division, which can be divided into physical network elements, logical network elements, and the number of equivalent network elements according to the purpose. The first in the first operators refers to a general term, which does not correspond to a specific operator name, and can be transformed into the same or different operator names according to actual application requirements. The first operator network element node in this embodiment refers to a network element that can operate as a node of the blockchain system, such as base stations, servers, clusters, etc. of operators such as China Mobile, China Unicom, or China Telecom; for example, various operators fog computing nodes, cloud computing center nodes, and edge computing nodes.
第一运营商网元节点身份包括但不限于第一运营商网元节点所在的运营商体系,比如移动、联通或电信等;网元本身的名称,如交换机、基站、或服务器等;第一运营商网元节点所在的IP地址、物理地址等,便于根链根据网络分片规则进行判断识别,进行网络分片。根链设定的网络分片规则基于公平公正,防止每一个分片网络趋于中心化的原则,确保每个分片网络的数据安全,数据的真实性及不可篡改,具体可根据实际应用需求灵活设定,比如将不同运营商的网元节点打乱分配至不同的网络分片中,即在同一个分片网络中不能够仅存在来自同一个运营商的节点;再或者,将计算能力强的节点分开设置到不同的分片网络中,防止分片网络之间的计算能力相差过于悬殊;确保每个分片网络的计算能力均衡等。The identity of the first operator's network element node includes but is not limited to the operator system where the first operator's network element node is located, such as China Mobile, China Unicom or China Telecom, etc.; the name of the network element itself, such as a switch, base station, or server, etc.; The IP address, physical address, etc. of the operator's network element node is convenient for the root chain to judge and identify according to the network fragmentation rules, and to perform network fragmentation. The network sharding rules set by the root chain are based on the principle of fairness and justice, preventing each sharded network from becoming centralized, and ensuring the data security of each sharded network, the authenticity of the data and the immutability of the data, which can be based on actual application requirements. Flexible settings, such as scrambled allocation of network element nodes of different operators to different network shards, that is, nodes from the same operator cannot exist in the same sharded network; Strong nodes are separately set up in different sharded networks to prevent the computing power of the sharded networks from being too different; to ensure that the computing power of each sharded network is balanced, etc.
若请求组网的第一运营商网元节点要求的共识方法,比如POS、DPOS、POW等共识算法,与第一网络的共识算法一致,且请求组网的第一运营商网元节点身份满足作为网络融合的区块链系统的根链的网络分片规则要求,则基于NFV/SDN技术对请求加入的第一运营商网元节点进行网络分片,将第一运营商网元节点分配至第一网络,完成不同运营商的网元设备的重新组网,方便运用根链优先原则进行网络融合。If the consensus method required by the network element node of the first operator of the requesting network, such as POS, DPOS, POW and other consensus algorithms, is consistent with the consensus algorithm of the first network, and the identity of the network element node of the first operator of the requesting network is satisfied As the network sharding rule requirements of the root chain of the blockchain system of network fusion, the network sharding is performed on the first operator's network element node requesting to join based on the NFV/SDN technology, and the first operator's network element node is allocated to The first network completes the re-networking of network element devices of different operators, which facilitates network integration by using the principle of root chain priority.
本实施例所述一种网络融合的组网方法的通信方式为MQTT。所述交易打包上链时,加入中科院国家授时中心的时间戳,以防止后期网络融合出现数据冲突。通过网络分片实现逻辑隔离,解决NFV/SDN网络切片安全隔离较低和部署较难的问题。The communication mode of the networking method for network convergence described in this embodiment is MQTT. When the transaction is packaged and uploaded to the chain, the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration. Logic isolation is achieved through network slicing, which solves the problems of low security isolation and difficult deployment of NFV/SDN network slicing.
5G基础设施共享,主要指卖方移动网络运营商(MNO)通过网络虚拟化,将物理和无线电基础设施资源抽象并分割成不同的虚拟资源提供出去。每个虚拟资源都有各自不同的功能、服务和目标。区块链可以助力实现更高效安全的5G资源共享和使用情况追溯。使用智能合约,可以自动实现去中心化协议共享和支付。5G infrastructure sharing mainly refers to the mobile network operator (MNO) of the seller abstracting and dividing physical and radio infrastructure resources into different virtual resources to provide them through network virtualization. Each virtual resource has its own distinct functions, services, and goals. Blockchain can help achieve more efficient and secure 5G resource sharing and usage traceability. Using smart contracts, decentralized protocol sharing and payments can be automated.
根链设定网络切片的遵循的原则和方法,5G无线接入网和核心网时采用NFV技术;目前4G网络中主要终端设备是手机,网络中的无线接入网部分(包括数字单元(DU)和射频单元(RU))和核心网部分都采用设备商提供的专用设备。The root chain sets the principles and methods to follow for network slicing. NFV technology is used in the 5G wireless access network and core network. At present, the main terminal equipment in the 4G network is the mobile phone, and the wireless access network part in the network (including the digital unit (DU) ) and radio frequency unit (RU)) and the core network part all use special equipment provided by equipment manufacturers.
为了实现网络切片,网络功能虚拟化(NFV,Network Function Virtualization)是先决条件。本质上讲,所谓NFV,就是将网络中的专用设备的软硬件功能(比如核心网中的MME,S/P-GW和PCRF,无线接入网中的数字单元DU等)转移到虚拟主机(VMs,Virtual Machines)上。这些虚拟主机是基于行业标准的商用服务器,它们是COTS商用现成产品,低成本且安装简便。简单的说,就是用基于行业标准的服务器、存储和网络设备,来取代网络中的专用的网元设备。In order to realize network slicing, Network Function Virtualization (NFV, Network Function Virtualization) is a prerequisite. In essence, the so-called NFV is to transfer the software and hardware functions of special equipment in the network (such as MME, S/P-GW and PCRF in the core network, digital unit DU in the wireless access network, etc.) to the virtual host ( VMs, Virtual Machines). These web hosts are based on industry standard commodity servers, they are COTS commercial off-the-shelf products that are low cost and easy to install. Simply put, it replaces dedicated network element devices in the network with industry-standard servers, storage, and network devices.
网络经过功能虚拟化后,无线接入网部分叫边缘云(Edge Cloud),而核心网部分叫核心云(Core Cloud),可以作为组网方法中的节点被网络切片,进行分配。边缘云中的VMs和核心云中的VMs,通过SDN(软件定义网络)互联这样,网络采用NFV和SDN技术后,执行切片就非常容易了,像切面包一样水平将网络“切”成多个虚拟子网络(片)就可以了。After the network is functionally virtualized, the wireless access network part is called the edge cloud (Edge Cloud), and the core network part is called the core cloud (Core Cloud), which can be sliced and allocated by the network as nodes in the networking method. The VMs in the edge cloud and the VMs in the core cloud are interconnected through SDN (software-defined networking). After the network adopts NFV and SDN technology, it is very easy to perform slicing, and the network is horizontally "sliced" into multiple pieces like bread. Virtual subnets (slices) are fine.
所述网络分片根据不同的需求,对物理基础设施或底层网络服务和功能的实例化,形成一个以上的第一运营商网元节点,根据所述组网方法进行组网,形成一个以上的第一网络。The network fragmentation instantiates the physical infrastructure or underlying network services and functions according to different requirements to form more than one first operator network element node, and performs networking according to the networking method to form more than one network element node. first network.
根据预定义的规则,根链上的智能合约可以实现允许不同的请求者自主和动态地协商各种服务合同条款。此外,运营商还可以在区块链注册和发布网络切片功能,比如:Based on predefined rules, smart contracts on the root chain can be implemented to allow different requesters to autonomously and dynamically negotiate various service contract terms. In addition, operators can also register and publish network slicing functions on the blockchain, such as:
根链上的智能合约约定切片选择lD:NSSAIThe smart contract on the root chain agrees to slice selection lD: NSSAI
智能合约切片约定,目的在是为不同的行业或者企业在运营商的5G网络上开辟一个专用虚拟网络,以达到行业或者企业特性化的需求。运营商原来面向个人或者个体(比如机器)的管道连接,可以跟大众用户在网络上隔离,走自己的专用公路;也可以基于切片网络来做简单网络维护;甚至可以通过切片,获得相对普通用户更有保障的SLA。The purpose of the smart contract slicing agreement is to open up a dedicated virtual network for different industries or enterprises on the operator's 5G network to meet the needs of the industry or enterprise's specialization. The operator's original pipeline connection for individuals or individuals (such as machines) can be isolated from the public users on the network and take their own dedicated roads; they can also do simple network maintenance based on slicing networks; they can even obtain relatively ordinary users through slicing More guaranteed SLA.
保证业务的SLA,包括带宽,延迟,丢包和抖动等传统网络指标,提高指标优势;Guarantee business SLA, including traditional network indicators such as bandwidth, delay, packet loss and jitter, and improve indicator advantages;
5G网络特性支持:一个UE最多同时支持8个切片,切片标识最多有32bits,其中切片类型最多有256个,每个切片类型最多可再细分24bit个。5G network feature support: a UE supports up to 8 slices at the same time, the slice identifier has a maximum of 32 bits, of which the slice type has a maximum of 256, and each slice type can be subdivided into a maximum of 24 bits.
时延:从终端到基站约4ms;从基站到边缘计算约5ms;从基站到省核心约5ms。Delay: about 4ms from terminal to base station; about 5ms from base station to edge computing; about 5ms from base station to provincial core.
隔离:获得一个逻辑上独立的网络,避免网络风险,同时避免泄密。Isolation: Obtain a logically independent network, avoid cyber risks, and avoid leaks.
自运维:切片租户可以查看自己切片有关的网络统计指标和状态。Self-operation and maintenance: slice tenants can view network statistics and status related to their slices.
标准定义的三个大场景eMBB、uRLLC和mMTC,被认为是三个公共网络,而不是一个,因为它们的实现技术(尤其是无线侧的技术)不一样。这三个场景本身提供的SLA保障,比如低延迟、大规模海量终端接入,是有价值的。但是在每一个场景内部进一步细分,比如eMBB内部再做「高/中/低」的SLA区分,就属于在公共网络上提供SLA保证。The three major scenarios defined by the standard, eMBB, uRLLC, and mMTC, are considered to be three public networks, not one, because their implementation technologies (especially those on the wireless side) are different. The SLA guarantees provided by these three scenarios, such as low latency and large-scale terminal access, are valuable. However, further subdivision within each scenario, such as "high/medium/low" SLA distinction within eMBB, belongs to the provision of SLA guarantees on the public network.
NSSAI是5G切片相关的概念中最具有创新意义的一个。NSSAI是多个S-NSSAI的集合,按照3GPP的定义,S-NSSAI是一个32位的整数,可以进一步划分为两个部分:SD和SST,其中SD是24位,SST则是8位。在32位计算机上,S-NSSAI就是一个整数,非常好处理。NSSAI is one of the most innovative concepts related to 5G slicing. NSSAI is a collection of multiple S-NSSAIs. According to the definition of 3GPP, S-NSSAI is a 32-bit integer, which can be further divided into two parts: SD and SST, where SD is 24 bits and SST is 8 bits. On a 32-bit computer, S-NSSAI is just an integer, which is very easy to handle.
SST定义了切片网络的类型,比如SST是1,则说明这个切片是eMBB切片;如果是2,则是uRLLC切片;如果是3,就是mMTC,都是大家耳熟能详的5G业务类型。SST defines the type of slice network. For example, if SST is 1, it means that the slice is an eMBB slice; if it is 2, it is a uRLLC slice; if it is 3, it is mMTC, all of which are well-known 5G service types.
5G用户在开户的时候,智能合约约定在核心网上签约一个或若干个S-NSSAI,可以简单认为签约一个或多个切片。在5G终端接入网络的时候,会携带一个或多个签约的S-NSSAI。在有多个网络切片的情况下,网络设备根据S-NSSAI,就知道终端希望接入的网络切片,并把终端接入到这个切片中。可以看出,在5G网络有多个切片的情况下,S-NSSAI会指导网络,把终端接入到哪个切片中。When a 5G user opens an account, the smart contract agrees to sign one or several S-NSSAIs on the core network, which can be simply considered to sign one or more slices. When a 5G terminal accesses the network, it will carry one or more subscribed S-NSSAIs. In the case of multiple network slices, the network device knows the network slice that the terminal wants to access according to the S-NSSAI, and accesses the terminal to this slice. It can be seen that when the 5G network has multiple slices, S-NSSAI will guide the network and which slice to connect the terminal to.
一个终端最多可以同时带给5G网络8个S-NSSAI,也就是可以同时接入8个切片。这不仅仅对手机的基带芯片提出要求(要处理S-NSSAI),同时对传统的手机操作系统和应用程序等都有了新的要求。最大的要求,就是要求终端操作系统支持「多实例」的IP协议栈(Multiple Instance IP Stack)。A terminal can bring up to 8 S-NSSAIs to the 5G network at the same time, that is, it can access 8 slices at the same time. This not only puts forward requirements on the baseband chip of the mobile phone (to handle S-NSSAI), but also imposes new requirements on traditional mobile phone operating systems and applications. The biggest requirement is to require the terminal operating system to support the "Multiple Instance IP Stack".
传统的手机操作系统,一旦接入运营商网络,会虚拟出一个网络接口来,并在这个接口上配置由核心网分配的IP地址。当然,传统的手机可以通过多个APN方式,或者单个APN多PDP Context方式,同时激活多个连接(对应多个接口),每个接口上分配一个IP地址,但是这些接口上的IP地址,必须不同。如果相同,手机将拒绝接入网络。The traditional mobile phone operating system, once connected to the operator's network, will virtualize a network interface, and configure the IP address assigned by the core network on this interface. Of course, traditional mobile phones can activate multiple connections (corresponding to multiple interfaces) at the same time through multiple APNs, or a single APN with multiple PDP Contexts, and assign an IP address to each interface, but the IP addresses on these interfaces must be different. If they are the same, the phone will refuse to access the network.
到了5G切片的场景,情况会有所不同。很多情况下,手机会同时接入多个切片。每个切片的IP地址,都可能独立分配,甚至不受运营商控制,由购买切片的企业分配。这样很大概率上,手机会出现IP地址冲突的情况。When it comes to 5G slicing scenarios, the situation will be different. In many cases, the mobile phone will access multiple slices at the same time. The IP address of each slice may be assigned independently, or even not controlled by the operator, but assigned by the enterprise that purchased the slice. In this way, there is a high probability that the mobile phone will have an IP address conflict.
为避免上述冲突,一个所述第一网络对应一个IP协议栈实例。基于根链智能合约设立操作系统内核的IP协议栈改动,实现多实例化协议栈,一个切片对应一个IP协议栈实例。类似于路由器上VRF的概念,但是更加复杂,因为还要考虑不同APP接入不同协议栈实例的问题。而基于本发明实施例中采用了一个一标准化的,人工智能的API接口。In order to avoid the above conflict, one of the first networks corresponds to one instance of the IP protocol stack. Based on the root chain smart contract, the IP protocol stack modification of the operating system kernel is established to realize multi-instantiated protocol stacks, and one slice corresponds to one IP protocol stack instance. Similar to the concept of VRF on routers, but more complicated, because the problem of different APPs accessing different protocol stack instances is also considered. And based on the embodiment of the present invention, a standardized, artificial intelligence API interface is adopted.
NSSAI和S-NSSAI是包含关系,一个NSSAI包含多个S-NSSAI,S-NSSAI中的前面这个S就是Single的意思。在5G中,网络切片,是指物理基础设施和底层网络服务技术核心网网络切片NSSAI and S-NSSAI are inclusive relationships. An NSSAI contains multiple S-NSSAIs. The preceding S in S-NSSAI means Single. In 5G, network slicing refers to physical infrastructure and underlying network service technology core network network slicing
核心网切片内共享和专用网元组合一般分为三种典型场景:The combination of shared and dedicated network elements within core network slices is generally divided into three typical scenarios:
控制用户面全隔离:Full isolation of control user plane:
切片共享网元:AUSF,UDM,NSSF。Slice sharing network elements: AUSF, UDM, NSSF.
切片专用网元:SMF,PCF,UPF,AMFSlicing dedicated network elements: SMF, PCF, UPF, AMF
1)场景:安全隔离需求/定制化需求较高的场景。不支持同一终端多切片场景。1) Scenario: Scenarios with high security isolation requirements/customization requirements. Multi-slice scenarios on the same terminal are not supported.
2)描述:尽量为切片分配专用控制和用户面网元,UDM/AUSF可按需在完全隔离厂家下也可以考虑 专用。2) Description: Allocate dedicated control and user plane network elements for slices as much as possible, and UDM/AUSF can be considered for dedicated use under complete isolation of manufacturers as needed.
3)安全隔离最高,成本最高,部署难度适中。3) The security isolation is the highest, the cost is the highest, and the deployment difficulty is moderate.
部分控制,用户面专用:Partial control, dedicated to the user plane:
切片共享网元:AMF,PCF,NSSF,UDMSlice sharing network elements: AMF, PCF, NSSF, UDM
切片专用网元:SMF,UPFSlicing dedicated network elements: SMF, UPF
1)场景:安全隔离适中,可支持同一终端多切片1) Scenario: moderate security isolation, can support multiple slices of the same terminal
2)描述:部分控制面,用户面专用。一般为SMF+UPF专用2) Description: part of the control plane, dedicated to the user plane. Generally dedicated to SMF+UPF
3)安全隔离一般,成本一般,部署较容易,厂家支持较好3) General security isolation, average cost, easy deployment, and good manufacturer support
现在所用的技术在成本较低时,厂家支持性也较好的情况下,安全隔离性一般,如果基于根链的保护方法,则安全性很好,成本也较低。现有网络融合难以部署的原因是四个运营商通信基站均为独立建设,而且西部偏远地区沙漠高原海岛海洋基站建设困难,成本极高。虽然形成了5G核心网络标准化的统一与融合,但服务网络无法融合,形成服务网络分割,从而使虚拟机的容量受到物理限制,如要让成本降低标准化统一部署,就必要要用根链来保护,服务网络切片。根链的虚拟机要摆脱物理限制,使虚拟机空间无限大,理论上,使存储的智能合约也为无限大,从而解决服务网络的统一融合。When the cost of the technology currently used is low and the manufacturer's support is good, the security isolation is average. If the protection method based on the root chain is used, the security is very good and the cost is low. The reason why it is difficult to deploy the existing network integration is that the four operators' communication base stations are all independently constructed, and the construction of marine base stations in the remote areas of the west, deserts, plateaus, islands, and oceans is difficult and the cost is extremely high. Although the unification and integration of the 5G core network standardization has been formed, the service network cannot be integrated, resulting in a segmentation of the service network, so that the capacity of the virtual machine is physically limited. To reduce costs and standardize the unified deployment, it is necessary to use the root chain to protect , serving network slices. The virtual machine of the root chain needs to get rid of physical restrictions, so that the virtual machine space is infinite. In theory, the smart contract stored is also infinite, so as to solve the unified integration of the service network.
“天基互联网融合了地面5G核心网和移动基站端来提供数据回传,是Mesh网状网,使用小平台路由微波链路的星间网络来提供数据连接。”例如:全球共有400万个基站,其中300万个基站在中国,但依然会发现高速公路上、大城市的一些小区域网络覆盖不足,延时会达到几百毫秒甚至十几秒,对于物联网来说这会导致传输的同步性出现巨大的问题,可能会导致整个物联网的崩溃,如何弥补这些通信的小盲点达到无间断的全联通的物联那就需要卫星,卫星与地面的5G网络互连,那云服务就可以采用空间的卫星,也就是进一步将云计算拓展成空间计算,而空间计算就没有了物理的限制。基于分层存储的区块链网络,大数据是存储在链下,云计算没有了物理限制那虚拟机就可以做到无限大,链上层基于前两个专利就明示了我们采用网状网的P2P网络架构,所以我们在提出了天基互联网融合地面5G核心网和移动基站端来提供数据回传,是Mesh网状网,使用小平台路由微波链路的星间网络来提供数据连接的技术方案。"The space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a mesh network that uses a small platform to route the inter-satellite network of microwave links to provide data connections." For example: there are 4 million in the world. Base stations, of which 3 million base stations are in China, but still find that some small areas on highways and large cities have insufficient network coverage, and the delay will reach hundreds of milliseconds or even ten seconds. For the Internet of Things, this will lead to transmission delays. There is a huge problem in synchronization, which may lead to the collapse of the entire Internet of Things. How to make up for these small blind spots in communication to achieve an uninterrupted and fully connected Internet of Things requires satellites, satellites and the ground 5G network interconnection, then cloud services will be Space satellites can be used, that is, to further expand cloud computing into space computing, and space computing has no physical limitations. Based on the layered storage blockchain network, big data is stored under the chain, and the virtual machine can be infinitely large without physical limitations in cloud computing. P2P network architecture, so we propose a space-based Internet that integrates the terrestrial 5G core network and mobile base stations to provide data backhaul. It is a mesh network that uses a small platform to route microwave links. Inter-satellite network to provide data connection technology plan.
5G核心网在切片中没有出现任何问题,安全性隔离性很高,只要解决基站层面的融合,解决基站来接受卫星信号是用了微波链路,微波链路就是对基站进行改进,可以利用微波的点波束覆盖用户,利用波速控制技术实现到服务终端,也就是物联网传感器终端的信号接收。There is no problem in the slicing of the 5G core network, and the security isolation is very high. As long as the integration at the base station level is solved, the microwave link is used to solve the problem that the base station receives satellite signals. The microwave link is to improve the base station and can use microwave The spot beam covers the user, and the wave speed control technology is used to realize the signal reception to the service terminal, that is, the IoT sensor terminal.
用户面专用User plane dedicated
切片共享网元:PCF,SMF,AUSF,UDM,NSSF,AMF;Slice sharing network elements: PCF, SMF, AUSF, UDM, NSSF, AMF;
切片专用网元:UPF;Dedicated network element for slicing: UPF;
1)场景:仅要求用户面隔离专用场景,支持同一终端多切片;1) Scenario: only requires dedicated user plane isolation scenarios, and supports multiple slices of the same terminal;
2)描述:用户面专用,控制面共享;2) Description: dedicated to the user plane and shared to the control plane;
3)安全隔离较低,成本最低,部署较难,需要打开SMF和UPF的N4接口。3) The security isolation is low, the cost is the lowest, and the deployment is difficult, and the N4 interface of SMF and UPF needs to be opened.
接入网切片技术及终端支持;Access network slicing technology and terminal support;
接入网能感知切片,实现切片级的资源分配、隔离和质量保证,实现不同切片内流量的差异化处理;不同的切片尽量共享无线网络资源,实现无线网络资源最大化利用。The access network can perceive slices, realize slice-level resource allocation, isolation, and quality assurance, and realize differentiated processing of traffic in different slices; different slices share wireless network resources as much as possible to maximize the utilization of wireless network resources.
1)接入网感知切片;1) Access network perception slice;
2)接入网支持切片核心网部分功能的选择;2) The access network supports the selection of some functions of the slicing core network;
3)接入网支持基于切片SLA映射的切片参数,实现切片级资源分配和调度;3) The access network supports slice parameters based on slice SLA mapping to realize slice-level resource allocation and scheduling;
4)切片在接入网资源可以共享也可以专用;4) Slices can be shared or dedicated in access network resources;
5)接入网支持不同切片的资源隔离;5) The access network supports resource isolation of different slices;
6)接入网支持切片可用性;6) The access network supports slice availability;
7)接入网支持单终端多切片多连接;7) The access network supports single terminal, multi-slice and multi-connection;
8)切片对接入网网管的需求:支持的切片实例、切片功能的定制化配置、切片参数指标(SLA量化);8) Slicing requirements for access network management: supported slicing instances, customized configuration of slicing functions, slicing parameter indicators (SLA quantification);
终端支持不同业务选择接入不同网络切片的能力,支持在接入网和核心网信令中携带接入网络切片的标识(S-NSSAI);The terminal supports the ability to select different network slices for different services, and supports the identification of the access network slice (S-NSSAI) in the access network and core network signaling;
1)终端支持存储和更新网络切片相关标识及切片选择策略的能力;1) The terminal supports the ability to store and update network slice related identifiers and slice selection strategies;
2)基于切片选择策略,支持按应用选择接入相应网络切片的能力;2) Based on the slice selection strategy, it supports the ability to select and access corresponding network slices by application;
3)终端支持在接入网和核心网信令中携带相关切片标识,传给网络;3) The terminal supports carrying relevant slice identifiers in the access network and core network signaling, and transmits it to the network;
4)终端可同时接入一个网络切片,也可以同时接入多个网络切片的能力;4) The terminal can access one network slice at the same time, and can also access multiple network slices at the same time;
5)终端可以同时通过一个或者多个无线网络站点获得网络切片业务。5) The terminal can obtain the network slicing service through one or more wireless network sites at the same time.
传输网切片技术Transmission Network Slicing Technology
传输网切片技术方案为硬隔离和软隔离,可以适配不同业务需求,包括带宽,时延,抖动,安全性等。The technical solution of transmission network slicing is hard isolation and soft isolation, which can adapt to different service requirements, including bandwidth, delay, jitter, and security.
无线网分片映射Wireless network fragmentation mapping
1)无线设备配置NSSAI到VLAN地址映射;1) Wireless devices configure NSSAI to VLAN address mapping;
2)无线创建子接口作为切片业务地址,每个切片业务单独分配IP+VLAN,进入不同传送网VPN;2) Wirelessly create a sub-interface as the slice service address, and each slice service is assigned IP+VLAN separately and enters different transport network VPNs;
3)携带相同5QI但属于不同切片NSSAI的会话将会映射到不同的VPN。3) Sessions carrying the same 5QI but belonging to different slice NSSAIs will be mapped to different VPNs.
传送网分片部署Transport network fragmentation deployment
1)省内传输按照SPN进行组网:(1)按照端到端SE切片以太网通道建立VPN管道,配置端到端交叉,支持硬隔离。(2)按照端到端L2VPN或者L3VPN建立VPN管道,支持软隔离;1) The intra-provincial transmission is networked according to SPN: (1) VPN pipes are established according to the end-to-end SE sliced Ethernet channel, end-to-end crossover is configured, and hard isolation is supported. (2) Establish VPN pipes according to end-to-end L2VPN or L3VPN to support soft isolation;
2)省干按照SPN+OTN组网,支持VPN。2) The provincial network is based on SPN+OTN and supports VPN.
核心网分片映射Core network fragmentation mapping
1)核心网平台配置S-NSSAI到IP地址映射;1) The core network platform configures S-NSSAI to IP address mapping;
2)核心网切片通过路由IP信息进入不同VPN切片。2) Core network slices enter different VPN slices by routing IP information.
网络切片管理Network slice management
网络切片生命周期管理Network slice lifecycle management
1)切片设计1) Slice Design
翻译网络切片业务需求,生成网络切片模板;将业务需求转化为切片网络需求,并映射到不同的管理域。Translate network slicing business requirements and generate network slicing templates; convert business requirements into slicing network requirements and map them to different management domains.
2)切片配置2) Slice configuration
生成端到端配置策略,与网络管理功能交互,配置网络切片中各类网络功能。Generate end-to-end configuration policies, interact with network management functions, and configure various network functions in network slices.
3)切片生命周期管理3) Slice life cycle management
业务级别生命周期管理,例如上线、下线、更新、扩缩容等。与NFV、SDN虚拟化生命周期管理协同。Business-level lifecycle management, such as online, offline, update, scaling, etc. Collaborate with NFV and SDN virtualization lifecycle management.
4)切片开放4) Slice open
将切片以服务的形式对外开放;开放部分网络切片的管理功能;Open slices as services; open the management functions of some network slices;
网络切片故障、性能管理Network slice failure, performance management
1)切片监控1) Slice monitoring
运营商对自有切片的管理/监控;运营商对第三方切片的管理/监控;第三方对其订购切片的管理/监控。The operator's management/monitoring of its own slices; the operator's management/monitoring of the third-party slices; the management/monitoring of the third-party's subscribed slices.
2)切片质量可保证2) Slice quality can be guaranteed
网络切片管理功能具备端到端网络切片的质量指标视图;子网络切片管理功能负责各域内的质量保证机制。The network slice management function has an end-to-end network slice quality indicator view; the sub-network slice management function is responsible for the quality assurance mechanism in each domain.
网络切片运维Network slice operation and maintenance
1)切片自动化及智能化1) Slicing automation and intelligence
切片管理各个阶段操作的自动化;基于智能的切片的部署、运行调整。Automation of operations at various stages of slice management; deployment and operation adjustment of slices based on intelligence.
切片的虚拟化实现Virtualization of slices
1)网络切片核心网使用虚拟化实现,无线虚拟化有待进一步确认;1) The network slicing core network is implemented using virtualization, and wireless virtualization needs to be further confirmed;
2)集中式NFVO统一管理多厂家网络功能。2) Centralized NFVO unified management of multi-vendor network functions.
运行流程run process
(1)客户提出业务需求,签署SLA:Latency:50ms,Reliability:99.99%,Roaming:NO,Max TP/Site:5Gbps,Meters:50million。(1) Customers put forward business requirements and sign SLA: Latency: 50ms, Reliability: 99.99%, Roaming: NO, Max TP/Site: 5Gbps, Meters: 50million.
(2)运营商收到需求,分析业务需求,生成网络需求(网络切片模板):业务模型,配置模型,资源模型。(2) The operator receives the demand, analyzes the business demand, and generates the network demand (network slice template): business model, configuration model, and resource model.
(3)如果新建网络切片,将新建需求发送给切片管理,出发切片设计及实例化流程。(3) If you create a new network slice, send the new requirements to the slice management, and start the slice design and instantiation process.
(4)运行态配置下发(业务配置激活,资源申请)。(4) Running state configuration delivery (service configuration activation, resource application).
针对不同的应用场景,网络被“切”成4“片”:For different application scenarios, the network is "cut" into 4 "slices":
高清视频切片:原来网络中数字单元(DU)和部分核心网功能被虚拟化后,加上存储服务器,统一放入边缘云。而部分被虚拟化的核心网功能放入核心云。High-definition video slicing: After the digital unit (DU) and some core network functions in the original network are virtualized, storage servers are added, and they are unified into the edge cloud. And some virtualized core network functions are put into the core cloud.
手机切片:原网络无线接入部分的数字单元(DU)被虚拟化后,放入边缘云。而原网络的核心网功能,包括IMS,被虚拟化后放入核心云。Mobile phone slicing: After the digital unit (DU) of the wireless access part of the original network is virtualized, it is put into the edge cloud. The core network functions of the original network, including IMS, are virtualized and put into the core cloud.
海量物联网切片:由于大部分传感器都是静止不动的,并不需要移动性管理,在这一切片里,核心云的任务相对轻松简单。Massive IoT Slice: Since most sensors are stationary and do not require mobility management, in this slice, the core cloud has relatively easy tasks.
任务关键性物联网切片:由于对时延要求很高,为了最小化端到端时延,原网络的核心网功能和相关服务器均下沉到边缘云。Mission-critical IoT slicing: Due to high latency requirements, in order to minimize end-to-end latency, the core network functions and related servers of the original network are all moved to the edge cloud.
网络结构是这样的:当然,网络切片技术并不仅限于这几类切片,它是灵活的,运营商可以随心所欲的根据应用场景定制自己的虚拟网络。The network structure is as follows: Of course, network slicing technology is not limited to these types of slices, it is flexible, and operators can customize their own virtual networks according to application scenarios.
2)边缘云与云计算的连接:IP/MPLS-SDN2) Connection between edge cloud and cloud computing: IP/MPLS-SDN
5G切片网络通过SDN连接边缘云和云计算里的VMs。云计算里有虚拟化的服务器,服务器的Hypervisor里运行着内置的vRouter/vSwitch,SDN控制器负责在虚拟服务器与DC G/W路由器之间创建SDN tunnels,随后,SDN控制器执行SDN tunnels和MPLS L3VPN之间的映射,从而建立云计算与边缘云之间的连接。The 5G slice network connects edge clouds and VMs in cloud computing through SDN. There are virtualized servers in cloud computing. The hypervisor of the server runs a built-in vRouter/vSwitch. The SDN controller is responsible for creating SDN tunnels between the virtual server and the DC G/W router. Then, the SDN controller executes SDN tunnels and MPLS. Mapping between L3VPNs to establish a connection between cloud computing and edge cloud.
3)边缘云与基站射频单元的网络切片3) Network slicing of edge cloud and base station RF unit
现在,我们来到前传部分。如何完成5G射频单元(RU)与边缘云之间(前传)部分的切片?首先需要定义5G前传的标准,目前并没有统一的标准。是国际电信联盟(ITU)5G移动通信标准研究小组(Focus Group on IMT-2020)Now, we come to the prequel part. How to complete the slicing between the 5G radio unit (RU) and the edge cloud (fronthaul)? First of all, it is necessary to define the standard of 5G fronthaul, and there is no unified standard at present. It is the International Telecommunication Union (ITU) 5G mobile communication standard research group (Focus Group on IMT-2020)
智能合约还可约定:Smart contracts can also agree on:
第一:5G基础设施众包:通过共享收益,引入社会资本,以资源招商的方式,进行招标。First: Crowdsourcing 5G infrastructure: By sharing benefits, introducing social capital, and conducting bidding in the form of resource investment.
第二:国际漫游:在这一场景中,未来可以采用基于区块链的分布式漫游网络接入和认证,高效、安全地共享区块链网络上的不同网络运营商的用户信息,实现漫游服务的无缝便捷接入,无需任何中央实体的干预。基于智能合约可以完成授权认证,以及自动计费和支付。Second: International roaming: In this scenario, blockchain-based distributed roaming network access and authentication can be used in the future to efficiently and securely share user information of different network operators on the blockchain network to achieve roaming Seamless and easy access to services without the intervention of any central entity. Authorization authentication, as well as automatic billing and payment can be completed based on smart contracts.
第三:物联网设备管理和认证:在5G中,数百万个物联网设备的连接延迟预计不到1毫秒。如此大量的物联网设备的结合,为未来的移动用户提供新的商业模式和服务开辟了可能性。基于区块链的去中心化管理方案,会具有更高的信任度、可见性、可追溯性,同样可实现自动化支付。Third: IoT device management and authentication: In 5G, connection latency for millions of IoT devices is expected to be less than 1 millisecond. The combination of such a large number of IoT devices opens up possibilities for new business models and services for future mobile users. The decentralized management solution based on blockchain will have higher trust, visibility, traceability, and can also realize automatic payment.
5G+区块链技术的融合是未来趋势。区块链和5G是互相助力,相辅相成的。基于5G的万物互联的实现可为物联网应用的发展带来无限可能。但数万亿级的节点部署、万物互联、互相提供服务,对数据的安全、数据及价值的交易。The integration of 5G + blockchain technology is the future trend. Blockchain and 5G help each other and complement each other. The realization of the Internet of Everything based on 5G can bring infinite possibilities for the development of Internet of Things applications. However, the deployment of trillions of nodes, the interconnection of all things, and the provision of services to each other, the security of data, the transaction of data and value.
从5G通信应用领域来看,区块链助力解决了这些问题。区块链与5G的融合可以重新定义数字经济时代。区块链可以被看作是确保5G网络安全的关键推动者。From the perspective of 5G communication applications, blockchain helps solve these problems. The integration of blockchain and 5G can redefine the era of the digital economy. Blockchain can be seen as a key enabler for securing 5G networks.
解决单点故障:在通信资源共享等场景中,使用去中心化的服务架构,将消除瓶颈问题,从而有效地增强了服务交付质量。Solve single point of failure: In scenarios such as communication resource sharing, using a decentralized service architecture will eliminate bottlenecks, thereby effectively enhancing the quality of service delivery.
数权问题:数据量指数增长。区块链为5G时代数据确权提供了基础设施支持。Number weight problem: The amount of data grows exponentially. Blockchain provides infrastructure support for data confirmation in the 5G era.
溯源问题:在服务共享、结算等场景中,共享的数据、资源使用情况等信息上链后不会被篡改、可追溯,减少服务纠纷。Traceability issues: In scenarios such as service sharing and settlement, shared data, resource usage and other information will not be tampered with and traceable after being uploaded to the chain, reducing service disputes.
安全问题:区块链和5G的结合可以通过提供分布式信任模型来增强隐私机制。Security concerns: The combination of blockchain and 5G can enhance privacy mechanisms by providing a distributed trust model.
多方协作:5G时代,运营商需要彻底改造后端系统,以管理由更多参与方和网络组成的更加复杂的5G生态系统。当今的系统根本不适合处理这个问题。这样,区块链正成为运营商通过高效、安全、可扩 展和透明的流程来实现这一点,并支持对5G未来的成功至关重要的多方协作。Multi-party collaboration: In the 5G era, operators need to completely overhaul their back-end systems to manage a more complex 5G ecosystem consisting of more parties and networks. Today's systems are simply not suited to handle this. In this way, blockchain is becoming an efficient, secure, scalable and transparent process for operators to do this, and to support the multi-party collaboration that is critical to the future success of 5G.
资源使用过程中,终端用户可以通过APP对网络服务进行投诉建议,投诉ID会在辅以相关网络性能参数后,通过区块链展示在资源详情中;承租方在网络资源使用中产生的资源告警和待优化需求也可以通过区块链知会到出租方;用户和承租方对服务的评价和反馈,会作为结算的考虑因素,在结算中记价体现。In the process of resource use, end users can make complaints and suggestions on network services through the APP, and the complaint ID will be displayed in the resource details through the blockchain after supplemented by relevant network performance parameters; resource alarms generated by the lessee during the use of network resources And the needs to be optimized can also be notified to the lessor through the blockchain; the evaluation and feedback of the user and the lessee on the service will be considered as a settlement factor and reflected in the settlement.
服务评估场景通过区块链建立对服务提供方的监督和反馈机制,提升网络服务质量和终端客户感知,保障投资人、承租方的利益,维护共建共享机制的健康运转。The service evaluation scenario establishes a supervision and feedback mechanism for service providers through blockchain, improves network service quality and end customer perception, protects the interests of investors and lessees, and maintains the healthy operation of the co-construction and sharing mechanism.
利用加密技术解决点到点传输安全问题,解决了账本存储问题,智能合约解决了业务定制化问题。突破性解决“电信网、广播电视网和互联网”三网融合技术难题。Using encryption technology to solve the security problem of point-to-point transmission, solve the problem of account book storage, and solve the problem of business customization through smart contracts. Breakthrough to solve the technical problems of "telecommunication network, radio and television network and the Internet" three-network integration.
一种网络融合的组网方法,适用于请求组网的第一运营商网元节点,根据以上所述的一种网络融合的组网方法,如图3所示,包括:A networking method for network convergence, applicable to a first operator network element node requesting networking, according to the above-mentioned networking method for network convergence, as shown in Figure 3, including:
S201、向根链发送至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易;S201. Send a first transaction to the root chain including at least the consensus method required by the first operator network element node requesting networking and the identity of the first operator network element node requesting networking;
S202、接收根链发来的将请求组网的第一运营商网元节点分配至第一网络的消息;S202. Receive a message from the root chain that assigns the network element node of the first operator that requests networking to the first network;
S203、向根链发送同意或不同意分配至第一网络的响应消息。S203. Send a response message agreeing or not agreeing to be allocated to the first network to the root chain.
实施例2Example 2
一种网络融合方法,适用于作为网络融合的区块链系统的根链上的虚拟机,或集群节点,如图4所示,包括:A network fusion method, suitable for virtual machines or cluster nodes on the root chain of the blockchain system as network fusion, as shown in Figure 4, including:
S301、接收第一运营商网元节点发来的请求利用不同于第一运营商的第二运营商的资源的第一请求交易,第一运营商网元节点身份验证通过后,则将第一转换合约接口发送至第一运营商网元节点;S301. Receive a first request transaction from a network element node of a first operator that requests to use resources of a second operator different from the first operator. After the identity verification of the network element node of the first operator is passed, the first The conversion contract interface is sent to the network element node of the first operator;
S302、接收第一运营商网元节点访问和退出第一转换合约接口的消息;S302, receiving a message that the first operator's network element node accesses and exits the first conversion contract interface;
S303、向第一运营商网元节点发送第一运营商网元节点访问和退出第一转换合约接口的基本信息;收到第一运营商网元节点发来的确认消息后上链;S303, sending basic information of the first operator's network element node accessing and exiting the first conversion contract interface to the first operator's network element node; uploading the chain after receiving the confirmation message sent by the first operator's network element node;
其中,所述根链上设置一个以上的第一转换合约,所述第一转换合约用于将所述第二运营商的资源访问和利用接口转换成第一运营商网元节点可访问和利用的接口方式;Wherein, more than one first conversion contract is set on the root chain, and the first conversion contract is used to convert the resource access and utilization interface of the second operator into a network element node of the first operator that can be accessed and used. interface;
所述第一运营商网元节点向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;The first operator network element node sends a first request transaction to the root chain for requesting to utilize resources of a second operator different from the first operator;
若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;If the identity verification of the first operator's network element node is passed, the first conversion contract interface is received;
访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;Access the first conversion contract interface, and send a message to the root chain to access the first conversion contract interface;
退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;Exit the first conversion contract interface, and send a message to the root chain to exit the first conversion contract interface;
接收根链发来的访问和退出第一转换合约接口的基本信息;Receive basic information about accessing and exiting the first conversion contract interface from the root chain;
核实访问和退出第一转换合约接口的基本信息,并反馈给根链。Verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
资源包括但不限于视频资源、流量资源等网络资源,还包括虚拟化的硬件资源等。第一运营商网元节点通过根链上设置的第一转换合约的作用,可轻松实现利用不同运营商的资源,实现便捷服务。第一转换合约可以分为不用的种类,硬件资源虚拟化后,可将不同运营商的基站、服务器、计算中心等均对外开放,相应的,所述根链上的所述第一转换合约的作用可以是用于不同运营商之间基站利用和访问接口变换;或用于不同运营商之间计算中心访问和利用的接口变换等。The resources include but are not limited to network resources such as video resources and traffic resources, as well as virtualized hardware resources. Through the role of the first conversion contract set on the root chain, the network element node of the first operator can easily utilize the resources of different operators and realize convenient services. The first conversion contract can be divided into different types. After the hardware resources are virtualized, the base stations, servers, computing centers, etc. of different operators can be opened to the outside world. Correspondingly, the first conversion contract on the root chain The function can be used for base station utilization and access interface conversion between different operators; or interface conversion for computing center access and utilization between different operators, etc.
将物理和无线电基础设施资源抽象并分割成不同的虚拟资源提供出去。每个虚拟资源都有各自不同的功能、服务和目标。区块链可以助力实现更高效安全的5G资源共享和使用情况追溯。使用智能合约,可以自动实现去中心化协议共享和支付。Abstract and partition physical and radio infrastructure resources into different virtual resources to provide. Each virtual resource has its own distinct functions, services, and goals. Blockchain can help achieve more efficient and secure 5G resource sharing and usage traceability. Using smart contracts, decentralized protocol sharing and payments can be automated.
通过根链上的第一转换合约,实现不同网络资源的互通互联,及不同节点网络接口之间实现灵活的流量负载与无缝切换,集群节点实现智能的流量管理与分配。为客户选择用户体验最佳的数据中心互联网接口。Through the first conversion contract on the root chain, the interconnection of different network resources is realized, and the flexible traffic load and seamless switching between the network interfaces of different nodes are realized, and the cluster nodes realize intelligent traffic management and distribution. Choose the data center internet interface with the best user experience for your customers.
第一运营商网元节点首次访问第一转换合约接口前需进行身份验证;所述身份验证的方法为:比对第一运营商网元节点哈希值与根链保存的哈希值是否一致,若一致,则允许访问,防止攻击,确保网络安全。Identity verification is required before the first operator's network element node accesses the first conversion contract interface for the first time; the identity verification method is: comparing whether the hash value of the first operator's network element node is consistent with the hash value stored in the root chain , if they are consistent, allow access to prevent attacks and ensure network security.
第一运营商网元节点访问和退出第一转换合约接口的基本信息,包括但不限于第一运营商网元节点访 问第一转换合约接口的时间,第一运营商网元节点退出第一转换合约接口的时间;流量大小,频带占用时长,费用等内容;实现结算,资源共享,网络融合的过程;实现通信及数据和价值交换。Basic information of the first operator's network element node accessing and exiting the first conversion contract interface, including but not limited to the time when the first operator's network element node accesses the first conversion contract interface, the first operator's network element node exiting the first conversion contract The time of the contract interface; the size of the traffic, the duration of the frequency band occupation, the cost, etc.; the process of realizing settlement, resource sharing, and network integration; realizing communication and data and value exchange.
作为本实施例可选的实施方式,所述第一运营商网元节点身份验证的过程,包括:As an optional implementation of this embodiment, the process of the first operator's network element node identity verification includes:
对第一运营商网元节点待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对,若一致,则通过所述加密密钥对第一运营商网元节点身份信息的密文,通过AES256算法解密得到第一运营商网元节点身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对不一致,则第一运营商网元节点身份验证不通过;Perform a hash operation on the encryption key to be verified by the first operator's network element node to obtain the encryption key hash value to be verified, and compare it with the encryption key hash value on the root chain. The encryption key is used to decrypt the ciphertext of the identity information of the first operator's network element node through AES256 algorithm to obtain the plaintext of the identity information of the first operator's network element node, and the identity verification of the access party is passed; if the encryption key to be verified is hashed If it is inconsistent with the hash value of the encryption key on the root chain, the first operator's network element node identity verification fails;
相应地,所述第一运营商网元节点身份加密的过程为:Correspondingly, the process of encrypting the identity of the first operator's network element node is:
通过加密密钥将第一运营商网元节点身份信息的明文根据AES256算法得到第一运营商网元节点身份信息的密文;Obtain the ciphertext of the identity information of the first operator's network element node according to the plaintext of the identity information of the first operator's network element node according to the AES256 algorithm by using the encryption key;
对加密密钥进行哈希运算后得到加密密钥哈希值,将加密密钥哈希值及第一运营商网元节点身份信息的密文在根链中上链。After hash operation is performed on the encryption key, a hash value of the encryption key is obtained, and the hash value of the encryption key and the ciphertext of the identity information of the first operator's network element node are uploaded in the root chain.
作为本实施例可选的实施方式,所述上链包括将上链内容保存至云计算或雾计算存储空间中。As an optional implementation of this embodiment, the on-chain includes saving the on-chain content in a cloud computing or fog computing storage space.
云计算或雾计算存储空间可以是归属于不同的运营商的,也可以是某一大数据计算中心的;还可以是来自于不同的网络分片,即不同的第一网络,均不受限制。数据传输通信方式为MQTT,上链时,加入中科院国家授时中心的时间戳,以防止后期网络融合出现数据冲突。Cloud computing or fog computing storage space can belong to different operators or a certain big data computing center; it can also come from different network shards, that is, different first networks, which are not limited . The data transmission communication method is MQTT. When uploading to the chain, the timestamp of the National Time Service Center of the Chinese Academy of Sciences is added to prevent data conflicts from occurring in the later network integration.
作为本实施例可选的实施方式,所述根链与版权注册机构通过第一转换合约接口进行数据交互;所述数据交互的方法包括:接收第一运营商网元节点发来的请求注册数字版权证书的第二请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求注册数字版权证书的第二请求交易;若符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的包含有DCI的数字版权证书,转发给第一运营商网元节点;若不符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的修改注册数字版权材料的通知,或不授予数字版权证书的通知,转发给第一运营商网元节点;或,接收第一运营商网元节点发来的请求验证数字版权证书DCI的第三请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求验证数字版权证书DCI的第三请求交易;若数字版权注册机构验证通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证通过的通知,转发给第一运营商网元节点;若数字版权注册机构验证不通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证不通过的通知,转发给第一运营商网元节点,版权保护机构和知识产权法院认可的证据平台存证。As an optional implementation of this embodiment, the root chain and the copyright registration agency perform data exchange through a first conversion contract interface; the data exchange method includes: receiving a request for registration number sent by the first operator's network element node The second request transaction of the copyright certificate, after the identity verification of the first operator's network element node is passed, the root chain sends the second request of the first operator's network element node to request the registration of the digital copyright certificate to the digital rights registration authority through the first conversion contract interface Transaction; if it complies with the review regulations of the digital copyright registration agency, the root chain receives the digital copyright certificate containing the DCI sent by the digital copyright registration agency, and forwards it to the network element node of the first operator; if it does not meet the review regulations of the digital copyright registration agency, then The root chain receives the notification of modifying the registered digital copyright material sent by the digital copyright registration agency, or the notification of not granting the digital copyright certificate, and forwards it to the first operator's network element node; or, receives the request sent by the first operator's network element node Verify the third request transaction of the digital copyright certificate DCI. After the identity verification of the first operator's network element node is passed, the root chain sends the first operator's network element node to the digital rights registration agency through the first conversion contract interface to request the verification of the digital copyright certificate DCI. The third request transaction; if the verification of the digital rights registration authority is passed, the root chain receives the notification of the verification of the DCI of the digital copyright certificate sent by the digital rights registration authority, and forwards it to the network element node of the first operator; if the verification of the digital rights registration authority does not If it passes, the root chain receives the notification that the DCI verification of the digital copyright certificate is not passed by the digital copyright registration agency, and forwards it to the first operator's network element node, the copyright protection agency and the evidence platform recognized by the intellectual property court.
第一转换合约接口为API接口,包括根链接收版权注册机构下发的包含有DCI的数字版权证书数据信息;包括根链向版权注册机构发送注册申请数字版权证书所需的材料内容,申请包含有DCI的数字版权证书数据信息的请求;包括根链向版权注册机构申请验证包含有DCI的数字版权证书数据信息。所述数据交互均采用中科院授时中心时间戳形成交易数据上链,所述DCI的形成,版权注册机构也采用中科院授时中心时间戳的数字签名形成。The first conversion contract interface is an API interface, including the root chain receiving the digital copyright certificate data information containing DCI issued by the copyright registration agency; including the root chain sending the material content required for the registration and application of the digital copyright certificate to the copyright registration agency, and the application includes A request for the data information of the digital copyright certificate with DCI; including the application of the root chain to the copyright registration authority to verify the data information of the digital copyright certificate containing the DCI. The data interaction adopts the timestamp of the Time Service Center of the Chinese Academy of Sciences to form the transaction data on the chain, and the formation of the DCI is also formed by the copyright registration agency using the digital signature of the timestamp of the Time Service Center of the Chinese Academy of Sciences.
一种网络融合方法,适用于作为网络融合的区块链系统的分片网络中的节点(包括集群节点),根据以上任一项所述的一种网络融合方法,如图5所示,包括:A network fusion method, suitable for nodes (including cluster nodes) in a sharded network as a network fusion blockchain system, according to any one of the network fusion methods described above, as shown in Figure 5, including :
S401、向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;S401. Send to the root chain a first request transaction requesting to utilize resources of a second operator different from the first operator;
S402、若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;S402. If the identity verification of the first operator's network element node is passed, the first conversion contract interface is received;
S403、访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;S403, accessing the first conversion contract interface, and sending a message for accessing the first conversion contract interface to the root chain;
S404、退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;S404, exiting the first conversion contract interface, and sending a message for exiting the first conversion contract interface to the root chain;
S405、接收根链发来的访问和退出第一转换合约接口的基本信息;S405. Receive the basic information of accessing and exiting the first conversion contract interface sent by the root chain;
S406、核实访问和退出第一转换合约接口的基本信息,并反馈给根链。S406, verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
作为本实施例的可选实施方式,所述第一转换合约接口还用于与版权注册机构进行数据交互,所述与版权注册机构进行数据交互的方法为:向根链发送请求注册数字版权证书所需的材料的第二请求交易;若符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的包含有DCI的数字版权证书;不符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的修改注册数字版权材 料的通知,或不授予数字版权证书的通知。As an optional implementation of this embodiment, the first conversion contract interface is also used for data interaction with the copyright registration authority, and the method for data interaction with the copyright registration authority is: sending a request to the root chain to register a digital copyright certificate The second request transaction of the required materials; if it meets the review regulations of the digital rights registration agency, receive the digital copyright certificate containing DCI sent by the digital rights registration agency forwarded by the root chain; if it does not meet the review regulations of the digital rights registration agency, receive The notice sent by the digital copyright registration agency forwarded by the root chain to modify the registered digital copyright material, or not to grant a digital copyright certificate.
根链支持多链结构:一条用于通信安全的联盟链;一条基于联盟链的跨链,以联盟网关构建的主链与侧链的跨链可以实现各运营商之间交易链上记账、链下交易的分层通道支付系统;一条专业的钱包系统,基于专业支付的跨链;一条公证网络系统,在各个节点之间传递有效的法律证明;各链之间,联盟链和基于联盟链的跨链、支付的钱包系统、公证网络系统之间以API实现数据交互、流量互联、代币交易,借助可编程智能数据包合约独立运行各类应用,手机使用者可以通过CA运营商不必持有敏感数据实现自动交易。The root chain supports multi-chain structure: a consortium chain for communication security; a cross-chain based on the consortium chain, the cross-chain of the main chain and the side chain constructed by the consortium gateway can realize the transaction chain accounting between operators, A layered channel payment system for off-chain transactions; a professional wallet system based on professional payment cross-chains; a notary network system that transmits valid legal proofs between nodes; between chains, consortium chains and consortium-based chains The cross-chain, payment wallet system, and notary network system use API to realize data interaction, traffic interconnection, and token transaction. With the help of programmable smart data package contracts, various applications can be run independently. Mobile phone users can pass the CA operator without having to hold Automated transactions with sensitive data.
一种网络融合方法,适用于终端(如手机、pad、笔记本电脑、台式电脑等终端设备),根据以上任一项所述的一种网络融合方法,如图6所示,包括:A network fusion method, suitable for terminals (such as mobile phones, pads, notebook computers, desktop computers and other terminal equipment), according to a network fusion method described in any one of the above, as shown in Figure 6, including:
S501、向第一运营商网元节点发送利用不同于第一运营商的第二运营商的资源的请求;S501. Send a request for utilizing resources of a second operator different from the first operator to a network element node of the first operator;
S502、接收第一运营商网元节点发来的第一转换合约接口;S502, receiving the first conversion contract interface sent by the first operator's network element node;
S503、访问第一转换合约接口,并通过第一运营商网元节点向根链发送访问第一转换合约接口的消息;S503, accessing the first conversion contract interface, and sending a message for accessing the first conversion contract interface to the root chain through the first operator network element node;
S504、退出第一转换合约接口,并通过第一运营商网元节点向根链发送退出第一转换合约接口的消息;S504, exiting the first conversion contract interface, and sending a message for exiting the first conversion contract interface to the root chain through the first operator network element node;
S505、接收通过第一运营商网元节点转发来的根链发来的访问和退出第一转换合约接口的基本信息;S505, receiving the basic information of accessing and exiting the first conversion contract interface sent by the root chain forwarded by the network element node of the first operator;
S506、核实访问和退出第一转换合约接口的基本信息,并通过第一运营商网元节点反馈给根链;S506, verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain through the first operator's network element node;
其中,接收到终端发来的利用不同于第一运营商的第二运营商的资源的请求后,Wherein, after receiving the request from the terminal to utilize the resources of the second operator different from the first operator,
所述第一运营商网元节点向根链发送终端请求利用不同于第一运营商的第二运营商的资源的第一请求交易;The network element node of the first operator sends a first request transaction for the terminal to request the use of resources of a second operator different from the first operator to the root chain;
若第一运营商网元节点及终端身份验证通过,则接收到第一转换合约接口并转发终端;If the identity verification of the first operator's network element node and the terminal is passed, the first conversion contract interface is received and forwarded to the terminal;
接收并向根链发送终端访问第一转换合约接口的消息;Receive and send a message to the root chain that the terminal accesses the first conversion contract interface;
接收并向根链发送终端退出第一转换合约接口的消息;Receive and send a message to the root chain that the terminal exits the first conversion contract interface;
接收根链发来的终端访问和退出第一转换合约接口的基本信息;Receive the basic information of terminal access and exit from the first conversion contract interface sent by the root chain;
接收并向根链反馈终端核实访问和退出第一转换合约接口的基本信息,进行上链。Receive and feed back to the root chain the terminal to verify the basic information for accessing and exiting the first conversion contract interface, and upload it to the chain.
终端包括但不限于手机、pad、笔记本电脑、台式电脑等终端设备。Terminals include but are not limited to mobile phones, pads, notebook computers, desktop computers and other terminal equipment.
根链保存完整帐本,资源使用过程中,终端用户可以通过上述核实,或者应用程序中上报对网络服务进行投诉建议,投诉ID会在辅以相关网络性能参数后,通过区块链展示在资源详情中;不同用户在网络资源使用中产生的资源告警和待优化需求也可以通过区块链知会到不同的运营商;用户和运营商对服务的评价和反馈,会作为结算的考虑因素,在结算中记价体现。The root chain saves the complete account book. During the use of resources, end users can make complaints about network services through the above verification or report in the application. The complaint ID will be displayed on the resource through the blockchain after supplemented by relevant network performance parameters. In the details; the resource alarms and needs to be optimized generated by different users in the use of network resources can also be notified to different operators through the blockchain; the evaluation and feedback of users and operators on services will be considered as a settlement factor. The price is reflected in the settlement.
服务评估场景通过区块链建立对服务提供方的监督和反馈机制,提升网络服务质量和终端客户感知,保障投资人、承租方的利益,维护共建共享机制的健康运转。利用加密技术解决点到点传输安全问题,解决了账本存储问题,智能合约解决了业务定制化问题。突破性解决“电信网、广播电视网和互联网”三网融合技术难题。The service evaluation scenario establishes a supervision and feedback mechanism for service providers through blockchain, improves network service quality and end customer perception, protects the interests of investors and lessees, and maintains the healthy operation of the co-construction and sharing mechanism. Using encryption technology to solve the security problem of point-to-point transmission, solve the problem of account book storage, and solve the problem of business customization through smart contracts. Breakthrough to solve the technical problems of "telecommunication network, radio and television network and the Internet" three-network integration.
作为本实施例可选的实施方式,所述终端与第一运营商网元节点之间,以及第一运营商网元节点与根链之间,及第一运营商网元节点之间,终端之间均采用5G通信或星地通信。As an optional implementation of this embodiment, between the terminal and the first operator's network element node, between the first operator's network element node and the root chain, and between the first operator's network element node, the terminal 5G communication or satellite-to-ground communication is used between them.
确保信号全覆盖,资源共享,实现全网融合的技术效果。通过融合的广电网络、电信网络以及互联网络进行传播(三网融合),最终实现用户以电视、电脑、手机等多种终端均可完成信息的融合接收(三屏合一),实现任何人、任何时间、任何地点、以任何终端获得任何想要的信息。Ensure full signal coverage, resource sharing, and achieve the technical effect of network-wide integration. Through the integration of radio and television network, telecommunication network and Internet network (three networks integration), users can finally complete the integration of information reception (three screens in one) through TV, computer, mobile phone and other terminals. Get any information you want, anytime, anywhere, with any terminal.
可选的实施方案是,所述终端与第一运营商网元节点之间,以及第一运营商网元节点与根链之间,及第一运营商网元节点之间,终端之间均采用天基互联网、5G通信或星地通信。可选的实施方案是,所述第一运营商网元节点为通信基站或卫星。An optional implementation is that between the terminal and the first operator's network element node, between the first operator's network element node and the root chain, and between the first operator's network element node, and between the terminals. Use space-based Internet, 5G communication or satellite-to-ground communication. An optional implementation is that the first operator network element node is a communication base station or a satellite.
通过融合的广电网络、电信网络以及互联网络进行传播(三网融合),最终实现用户以电视、电脑、手机等多种终端均可完成信息的融合接收(三屏合一),实现任何人、任何时间、任何地点、以任何终端获得任何想要的信息(5W)。Through the integration of radio and television network, telecommunication network and Internet network (three networks integration), users can finally complete the integration of information reception (three screens in one) through TV, computer, mobile phone and other terminals. Any time, any place, any terminal to get any desired information (5W).
S1、IP数据通过IP数据广播系统经打包后进入复用器。电视节目和语音节目分别通过电视播出系统和语音播出系统播出,经过MPE-5编码、统计复用,再与IP打包后的信号二次复用,经调制和光缆传输 送往卫星上行站,播出信号覆盖到全地域,基于互联网实现与广播电视网的数据交换。S1. The IP data enters the multiplexer after being packaged through the IP data broadcasting system. TV programs and voice programs are broadcast through the TV broadcast system and the voice broadcast system respectively. After MPE-5 encoding, statistical multiplexing, and then multiplexing with the IP-packed signal, they are sent to the satellite uplink after modulation and optical cable transmission. The broadcast signal covers the whole area, and the data exchange with the radio and television network is realized based on the Internet.
S2、天基互联网融合了地面5G核心网和移动基站端来提供数据回传,是Mesh网状网,使用小平台路由微波链路的星间网络来提供数据连接。S2. Space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a Mesh network that uses an inter-satellite network that routes microwave links on a small platform to provide data connections.
S3、各运营商平台原ID和IP地址不变,网络技术架构、存储架构、治理组织不变的基础为各平台网络间提供流通交互、互联互通服务。各平台以利用iLAB-x.com共识机制的标准化数据接口,为一条联盟链。S3. The original ID and IP address of each operator's platform remain unchanged, and the network technical architecture, storage architecture, and governance organization remain unchanged to provide circulation, interaction, and interconnection services between platforms and networks. Each platform uses the standardized data interface of the iLAB-x.com consensus mechanism to form a consortium chain.
S4、用户以电视、电脑、手机等多种终端均可完成信息的融合接收(三屏合一)S4. Users can complete the integrated reception of information with various terminals such as TV, computer, mobile phone (three screens in one)
1、广播电视信号IP化,采用DVB-DASH标准DVB-DASH1. IP-based radio and TV signals, using DVB-DASH standard DVB-DASH
DVB-DASH定义了基于MPEG DASH规范并通过HTTP自适应流传输的电视内容交付。MPEG DASH是第一个国际标准化的基于HTTP的自适应比特率流传输解决方案。为了提高互操作性,在DVB-DASH中定义了额外的限制和要求,并参考了DVB工具箱中适合与MPEG DASH一起使用的视频和音频编解码器。蓝皮书包括高清电视(HDTV),超高清电视(UHDTV),高动态范围(HDR)电视,高帧频(HFR)视频和下一代音频(NGA)。它还说明了如何实现低延迟交付和内容呈现。DVB-DASH defines the delivery of TV content based on the MPEG DASH specification and via HTTP adaptive streaming. MPEG DASH is the first internationally standardized HTTP-based adaptive bitrate streaming solution. To improve interoperability, additional restrictions and requirements are defined in DVB-DASH, and reference is made to the DVB Toolbox for video and audio codecs suitable for use with MPEG DASH. The Blue Book includes high-definition television (HDTV), ultra-high-definition television (UHDTV), high dynamic range (HDR) television, high frame rate (HFR) video, and next-generation audio (NGA). It also explains how to achieve low-latency delivery and content rendering.
面对的问题problems faced
由于传送网络的段长度和未知性能,DASH播放器中引入了Internet交付内容中的一些延迟。播放器采取的策略通常是缓冲多个段以减少卡顿的可能性。也可以采用更短的段来实现更低的延迟。但是较短的段会使编码器更难高效工作,因此最终用户看到的视频质量会受影响。Due to segment lengths and unknown performance of the delivery network, some delays in Internet-delivered content are introduced in the DASH player. The strategy adopted by the player is usually to buffer multiple segments to reduce the chance of stuttering. Shorter segments can also be used to achieve lower latency. But shorter segments make it harder for the encoder to work efficiently, so the video quality seen by the end user suffers.
提出的方案proposed scheme
DVB-DASH中针对低延迟的解决方案是将片段分成较小的块。编码器不是一次输出整个片段,而是将片段分成帧组,其中一组中的所有帧都不需要来自后面一组的帧才能进行解码。然后DASH打包程序将每组帧放入CMAF块中,并将其传入CDN。The solution for low latency in DVB-DASH is to divide fragments into smaller chunks. Instead of outputting the entire segment at once, the encoder divides the segment into groups of frames, where none of the frames in a group need frames from a later group to be decoded. The DASH packager then puts each set of frames into a CMAF block and passes it into the CDN.
当DASH客户端通过流式传输服务时,它使用媒体表示描述(MPD)文件获取服务参数。通常MPD会在整个段可用之后发出该段可用的信号。但是在低延迟模式下,当第一个块被传入CDN时,MPD会发出该段开始可用的时间信号。When a DASH client is streaming a service, it uses a Media Presentation Description (MPD) file to obtain service parameters. Normally MPD will signal that a segment is available after the entire segment is available. But in low-latency mode, when the first chunk is passed into the CDN, MPD signals when that segment becomes available.
2、NGN非地面网络——天基互联网2. NGN non-terrestrial network - space-based Internet
NGN是一个分组网络,它提供包括电信业务在内的多种业务,能够利用多种带宽和具有QoS能力的传送技术,实现业务功能与底层传送技术的分离。NGN is a packet network, which provides a variety of services including telecommunication services, and can utilize a variety of bandwidths and transport technologies with QoS capabilities to realize the separation of business functions and underlying transport technologies.
是以软交换为核心的,能够提供包括语音、数据、视频和多媒体业务的基于分组技术的综合开放的网络架构。With softswitch as the core, it can provide a comprehensive and open network architecture based on packet technology including voice, data, video and multimedia services.
是以软交换为核心的,能够提供包括语音、数据、视频和多媒体业务的基于分组技术的综合开放的网络架构。With softswitch as the core, it can provide a comprehensive and open network architecture based on packet technology including voice, data, video and multimedia services.
天基互联网是通过卫星实现数据的传输,也就是说卫星是这个互联网当中起到基站的作用,所以相对于其他的通讯方式来说,最大的区别就是卫星。通过卫星的话那接受和发送信号的微波芯片和组件也需要。相应的基础软件也有所不同。存储和计算的软硬件和其他方式类同。The space-based Internet realizes data transmission through satellites, which means that satellites play the role of base stations in the Internet. Therefore, compared with other communication methods, the biggest difference is satellites. Microwave chips and components that receive and send signals are also needed via satellite. The corresponding basic software is also different. The hardware and software of storage and computing are similar to other methods.
(1)数据指标优秀:卫星互联网的延时只有10-15毫秒,优于很多地方的移动通信和宽带网络。(1) Excellent data indicators: The delay of satellite Internet is only 10-15 milliseconds, which is better than that of mobile communication and broadband networks in many places.
(2)应用场景容易做拓展应用:互联网卫星只有400km左右的经密轨道,因此它的地面接收天线非常小,终端也非常小(15厘米直径的路由器小圆盒子),而不是高轨卫星一个很大的卫星接收器,因此卫星互联网的应用场景就很丰富,放在汽车上、放在家里,都可以完成全球互联网的搭建和渗透。(2) The application scenario is easy to expand the application: the Internet satellite has only a dense orbit of about 400km, so its ground receiving antenna is very small, and the terminal is also very small (a small round box of a router with a diameter of 15 cm), not a high-orbit satellite. A very large satellite receiver, so the application scenarios of satellite Internet are very rich. Putting it in the car or at home can complete the construction and penetration of the global Internet.
(3)基础设施价格比光纤通信要低很多,尤其是从人均指标来进行考量。(3) The price of infrastructure is much lower than that of optical fiber communication, especially considering the per capita index.
基于上述优势,3GPP和ITU两大通信标准组织,已经为天基卫星互联网提出了两大应用场景。Based on the above advantages, 3GPP and ITU, two major communication standards organizations, have proposed two major application scenarios for the space-based satellite Internet.
①通信增强:对于尚未建设通信地面骨干网设施的全球49%人口进行通信增强,通过卫星互联网的方式,节省掉通信光纤建设成本,这些地区的基础地面网将通过卫星直接连入全球互联网骨干线,所以第一个场景针对是35~40亿人的生意。①Communication enhancement: For the 49% of the world's population who have not yet built communication ground backbone network facilities, the communication enhancement will be carried out, and the construction cost of communication optical fiber will be saved by means of satellite Internet. The basic ground network in these areas will be directly connected to the global Internet backbone line through satellite. , so the first scenario is aimed at the business of 3.5 to 4 billion people.
②大规模物联网:包括纽约、伦敦、北京、上海这些高密度人口聚集区也存在大量的市场空间。中国的4G网络建设非常迅速,全球400万个基站有300万个在中国,但大家依然会发现城际高速公路上、大 城市的一些小区域的网络覆盖不足,延时可能会达到几百毫秒甚至十几秒。对于小规模物联网来说这个延时影响不太大,但对于上万量级、上千万量级用户接入的巨型物联网来说,一旦出现较长的延时,就会导致信息传输的同步性出现巨大的问题,进而导致整个物联网大网络的崩溃②Large-scale Internet of Things: There is also a lot of market space in high-density population gathering areas including New York, London, Beijing, and Shanghai. China's 4G network construction is very fast. 3 million of the world's 4 million base stations are located in China, but everyone still finds that the network coverage on intercity expressways and some small areas in large cities is insufficient, and the delay may reach several hundred milliseconds Even ten seconds. For small-scale Internet of Things, this delay has little impact, but for giant Internet of Things with tens of thousands of users and tens of millions of users, once a long delay occurs, it will lead to information transmission. There is a huge problem with the synchronization of the Internet of Things, which leads to the collapse of the entire Internet of Things network
所以如何弥补通信小盲点、达到无间断全联通的大规模物联场景?这只能靠卫星互联网去实现。所以卫星互联网是推进人类未来进入智能化的重要基础设施推手,CTPP、ITO两大通信标准组织也是正因于此,才提出来要去推进卫星物联网的标准制订。他们管卫星互联网叫NGN(非地面网络),去推进卫星互联网和地面网络的融合,这也是以后有可能会出现的——6G的方向。So how to make up for the small blind spots in communication and achieve a large-scale IoT scenario with uninterrupted and full connectivity? This can only be achieved with satellite internet. Therefore, the satellite Internet is an important infrastructure promoter to promote human intelligence in the future. It is also because of this that the two major communication standards organizations, CTPP and ITO, propose to promote the formulation of standards for the satellite Internet of Things. They call satellite Internet NGN (Non-Ground Network) to promote the integration of satellite Internet and terrestrial network, which is also likely to appear in the future - the direction of 6G.
我国目前与美国为第一梯队,建设进度落后一年,目前仅为中美两国开始全球卫星互联网的建设,是在2018年前发射第一颗技术验证星,实现单星关键技术验证;第二步,是发射4颗业务试验星,组建一个小星座,让用户进行初步业务体验;第三步,在距离地面1000公里的轨道上实现全部156颗卫星组网运行,构建一个星载宽带全球移动互联网络,实现网络无差别的全球覆盖。At present, my country and the United States are the first echelon, and the construction progress is one year behind. At present, only China and the United States have started the construction of the global satellite Internet. It is to launch the first technology verification satellite before 2018 to realize the verification of key technologies of a single satellite; The second step is to launch 4 service test satellites to form a small constellation to allow users to have a preliminary business experience; the third step is to realize the network operation of all 156 satellites on an orbit 1,000 kilometers away from the ground to build a global satellite-borne broadband Mobile Internet network to achieve undifferentiated global coverage of the network.
2018年12月,我国首颗虹云工程技术验证星成功发射入轨,并完成了不同天气条件、不同载体、不同业务场景下的功能与性能测试,成功实现了网页浏览、微信发送、视频聊天、高清视频点播等典型互联网业务。2020年,虹云工程将再发射4颗业务试验星,通过组网完成区域覆盖。随后,虹云工程首个应用示范系统也将投入使用。可以预见,虹云工程建成后,将集通信、导航和遥感一体化、全球覆盖、系统自主可控等优势于一身,实现极低的通信延时、极高的频率复用率、真正的全球覆盖应用,满足中国及国际互联网欠发达地区接入互联网的需求。同时,在应急通信、传感器数据采集、工业物联网、无人机、自动驾驶等行业应用方面,也将起到极大的推动作用。In December 2018, my country's first Hongyun engineering technology verification satellite was successfully launched into orbit, and completed function and performance tests under different weather conditions, different carriers, and different business scenarios, and successfully realized web browsing, WeChat sending, and video chat. , HD video on demand and other typical Internet services. In 2020, Hongyun Engineering will launch four more business test satellites to complete regional coverage through networking. Subsequently, the first application demonstration system of Hongyun Project will also be put into use. It is foreseeable that after the completion of the Hongyun project, it will integrate the advantages of communication, navigation and remote sensing integration, global coverage, and autonomous and controllable systems to achieve extremely low communication delay, extremely high frequency reuse rate, and a truly global Covering applications to meet the needs of Internet access in China and underdeveloped areas of the Internet. At the same time, it will also play a great role in promoting industrial applications such as emergency communications, sensor data collection, industrial Internet of Things, drones, and autonomous driving.
NGN非地面网络能够与现有网络如PSTN、ISDN和GSM等互通现有电信网规模庞大,NGN可以通过网关等设备与现有网络互联互通,保护现有投资。同时NGN也支持现有终端和IP智能终端,包括模拟电话、传真机、ISDN终端、移动电话、GPRS终端、SIP终端、H248终端、MGCP终端、通过PC的以太网电话、线缆调制解调器等。The NGN non-terrestrial network can communicate with existing networks such as PSTN, ISDN and GSM. The existing telecommunication network has a huge scale, and NGN can communicate with the existing network through gateways and other equipment to protect the existing investment. At the same time, NGN also supports existing terminals and IP smart terminals, including analog telephones, fax machines, ISDN terminals, mobile phones, GPRS terminals, SIP terminals, H248 terminals, MGCP terminals, Ethernet telephones via PC, cable modems, etc.
(1)多媒体化:中发展最快的一个特点就是多媒体特点,在此同时多媒体特点也是天基互联网最基本、最明显的特点。(1) Multimedia: One of the fastest growing features in China is the multimedia feature. At the same time, the multimedia feature is also the most basic and obvious feature of the space-based Internet.
(2)开放性:非地面NGN网络是具有开放的、标准的接口,它可以为用户快速提供多样的定制业务。(2) Openness: The non-terrestrial NGN network has an open and standard interface, which can quickly provide users with a variety of customized services.
(3)个性化:个性化业务可以提供将给未来的运营商带来极为丰厚的利润。(3) Personalization: Personalized services can be provided and will bring extremely lucrative profits to future operators.
(4)虚拟化:虚拟业务将是个人身份、联系方式,甚至于住所都虚拟化。使用用户可以使用个人号码,号码可以携带等虚拟业务,实现任何时候、任何地方的通信方式。(4) Virtualization: Virtual business will virtualize personal identity, contact information, and even residence. Users can use virtual services such as personal numbers and number portability to realize communication methods at any time and anywhere.
(5)智能化:非地面NGN的通信终端具有智能化、多样化的特点,网络业务和终端特性相结合可以提供更加为用户提供更加智能化的业务。(5) Intelligence: The communication terminals of non-terrestrial NGN have the characteristics of intelligence and diversification. The combination of network services and terminal characteristics can provide more intelligent services for users.
3、天基互联网融合了地面5G核心网和移动基站端来提供数据回传,是Mesh网状网,使用小平台路由微波链路的星间网络来提供数据连接。(未来的6G)3. The space-based Internet integrates the terrestrial 5G core network and the mobile base station to provide data backhaul. It is a mesh network that uses a small platform to route the inter-satellite network of microwave links to provide data connections. (Future 6G)
虹云工程于2020年完成业务试验系统。2022年,我国将部署、运营整个星座,构建156颗卫星组成的天基宽带互联网,形成以低轨宽带通信为主,并具备导航增强、实时遥感支持能力的通信、导航、遥感综合信息系统。“届时,无论我们身处沙漠、海洋或是飞机上,都能享受到与家里一样的上网速度和服务体验Hongyun Engineering will complete the business test system in 2020. In 2022, my country will deploy and operate the entire constellation, build a space-based broadband Internet consisting of 156 satellites, and form a communication, navigation, and remote sensing integrated information system that focuses on low-orbit broadband communication, and has the ability to enhance navigation and support real-time remote sensing. "At that time, whether we are in the desert, the ocean or on a plane, we will be able to enjoy the same Internet speed and service experience as at home.
虹云工程成为世界首套低轨Ka宽带通信系统,并在全世界首次采用宽带星间通信、星上宽带路由、多通道移相芯片等技术,宽带卫星通信终端体积最小、功耗最小、重量最轻Hongyun Project has become the world's first low-orbit Ka broadband communication system, and has adopted technologies such as broadband inter-satellite communication, on-satellite broadband routing, and multi-channel phase-shifting chips for the first time in the world. The broadband satellite communication terminal is the smallest in size, power consumption, and weight. lightest
S2.1 5G+天基互联网,采用半导体硅作为电子相控阵技术,也通过在几公分大小晶圆拥有接收发射阵列,利用点波束覆盖用户。S2.1 5G+ space-based Internet uses semiconductor silicon as the electronic phased array technology, and also has a receiving and transmitting array on a wafer of several centimeters to cover users with spot beams.
一种常见的配置是使用具有高性能SiGe BiCMOS IF到毫米波转换的CMOS数据转换器。波束成型可采用多种技术实现,具体取决于系统需求A common configuration is to use a CMOS data converter with high performance SiGe BiCMOS IF to mmWave conversion. Beamforming can be implemented using a variety of techniques, depending on system requirements
(1)根据所选的天线尺寸和发射功率要求,可以实现高度集成的硅方法,也可以是硅波束成型与离散PA和LNA的组合。(1) Depending on the chosen antenna size and transmit power requirements, a highly integrated silicon approach can be implemented, or a combination of silicon beamforming with discrete PAs and LNAs.
(2)功率放大器技术的选择基于综合考虑所需的变送器功率、天线增益(元件数)和所选技术的RF 发电能力,5G毫米波无线电的架构与技术”中进行的分析得出,最佳天线尺寸介于128至256个元件之间,较低的数量通过GaAs功率放大器实现,而较大的数量可采用全硅波束成型基于RF IC的技术实现。(2) The selection of power amplifier technology is based on comprehensive consideration of the required transmitter power, antenna gain (number of elements) and the RF power generation capability of the selected technology. The optimal antenna size is between 128 and 256 elements, with lower numbers achieved with GaAs power amplifiers and larger numbers with all-silicon beamforming RF IC-based technology.
(3)移动用户设备(手机)非常适合CMOS技术,相对较低的天线数量可以达到所需的变送器功率。这种类型的无线电将需要高度集成和省电才能满足便携式设备的需求。本地基站(小型蜂窝)和消费者终端设备(可移动电源)要求类似,涉及从变送器功率要求低端的CMOS到更高端的SiGe BiCMOS的一系列技术。(3) Mobile user equipment (mobile phones) is very suitable for CMOS technology, and the relatively low number of antennas can achieve the required transmitter power. This type of radio will need to be highly integrated and power efficient to meet the demands of portable devices. Local base stations (small cells) and consumer end equipment (removable power supplies) have similar requirements, involving a range of technologies from CMOS with low-end transmitter power requirements to higher-end SiGe BiCMOS.
(4)中程基站非常适合SiGe BiCMOS技术,可实现紧凑的外形尺寸。在高端,对于广域基站来说,可以应用各种技术,具体取决于对天线尺寸和技术成本的权衡。尽管可在60dBm EIRP范围内应用SiGe BiCMOS,但GaAs或GaN功率放大器更适合更高的功率。(4) Mid-range base stations are well suited for SiGe BiCMOS technology, enabling compact form factors. At the high end, for wide area base stations, various technologies can be applied, depending on the trade-off between antenna size and technology cost. Although SiGe BiCMOS can be applied in the 60dBm EIRP range, GaAs or GaN power amplifiers are more suitable for higher power.
S2.2利用SI所述相控阵、多天线技术,以波束控制实现5G标准的毫米波低地球轨道互联网星座,与NB-ioT(窄带蜂窝物联网)的结合S2.2 uses the phased array and multi-antenna technology described in SI to realize the 5G standard millimeter-wave low-earth orbit Internet constellation with beam control, and the combination with NB-ioT (Narrowband Cellular Internet of Things)
NB-iot可以解决5G通信中的丰度需求,让无数的智能终端连接起来;如果有了卫星星座在广度上的支持,那么很多应用场景都可以实现。低轨星座位于近地轨道,距离地面仅几百公里,延迟完全满足设备需求。基于5G标准的毫米波低轨星座与NB-ioT,一个用于广域间的网络连接,一个实现用户本地间的低功耗的设备连接,可谓优势互补。NB-iot can solve the abundance demand in 5G communication and connect countless smart terminals; if there is the support of satellite constellation in breadth, many application scenarios can be realized. The low-orbit constellation is located in low-Earth orbit, only a few hundred kilometers from the ground, and the delay fully meets the equipment requirements. The 5G standard-based millimeter-wave low-orbit constellation and NB-ioT, one for wide-area network connection and one for low-power device connection between users, can be described as complementary advantages.
3D-MIMO通过采用二维天线阵列和先进的信号处理算法,可以实现精确的三维波束成形,实现更好的干扰抑制和空间多用户复用的能力,是提升系统容量和传输效率的有效手段。因此,3D-MIMO也成为4G演进和5G的核心技术。By using two-dimensional antenna arrays and advanced signal processing algorithms, 3D-MIMO can achieve accurate three-dimensional beamforming, achieve better interference suppression and spatial multi-user multiplexing capabilities, and is an effective means to improve system capacity and transmission efficiency. Therefore, 3D-MIMO has also become the core technology of 4G evolution and 5G.
3D-MIMO相比传统基站采用了更多的收发通道,如果依然保持“BBU+RRU+天线”的架构存在两方面问题。Compared with traditional base stations, 3D-MIMO uses more transceiver channels. If the "BBU+RRU+antenna" architecture is still maintained, there are two problems.
一方面,收发通道数的增加使得天线和RRU之间需要更多的馈线连接,这将给实际布网带来很大的麻烦,增加了设备安装的时间,馈线越多也越容易出错。而将天线和RRU集成能很好地解决这个问题,不仅省去了馈线,而且消除了因馈线带来的损耗(架构1)。另一方面,通道数的增加也增加了对RRU和BBU之间CPRI接口的带宽需求,从而增加了光纤的成本。为了降低CPRI接口带宽的需求,一种方法是将BBU的部分功能上移(架构2),另一种方法是进一步将BBU、RRU和天线都集成到一起形成一体化站型(架构3)。On the one hand, the increase in the number of transceiver channels requires more feeder connections between the antenna and the RRU, which will bring great trouble to the actual network layout and increase the time for equipment installation. The more feeders, the more prone to errors. The integration of the antenna and the RRU can solve this problem well, not only eliminating the feeder, but also eliminating the loss caused by the feeder (Architecture 1). On the other hand, the increase in the number of channels also increases the bandwidth requirement for the CPRI interface between the RRU and the BBU, thereby increasing the cost of the fiber. In order to reduce the requirement of CPRI interface bandwidth, one method is to move some functions of the BBU up (Architecture 2), and the other method is to further integrate the BBU, RRU and antenna together to form an integrated station type (Architecture 3).
架构2虽然能降低CPRI接口带宽需求,但是BBU和RRU之间的接口需要重新定义。架构3直接取消了CPRI接口,更高的集成度将使得未来的布网和架站更加方便快捷,不过也对设备的尺寸、重量和散热等方面的设计提出了更高的要求。波束控制,多天线电子相控阵技术的应用是解决这一问题的关键:Although architecture 2 can reduce the bandwidth requirement of the CPRI interface, the interface between the BBU and the RRU needs to be redefined. Architecture 3 directly cancels the CPRI interface. The higher integration level will make the future network layout and rack station more convenient and fast, but it also puts forward higher requirements for the design of equipment size, weight and heat dissipation. Beam steering, the application of multi-antenna electronic phased array technology is the key to solving this problem:
系统的一端或两端同时发生移动的过程中,传输发挥出移动物联网的有效性能所需的海量数据,已经被证明是极其困难的。为了以极高的效率在运动的网络之间传输大量的数据,一种称为“波束控制”的技术将发挥关键的作用。波束控制技术不再在所有方向上发射宽带无线数据信号,而是将数据发送到需要该数据的具体的用户位置处。这样可以节省功率,使更多的用户可以获得高带宽的无线信号,防止信号之间相互干扰。With one or both ends of the system moving at the same time, it has proven to be extremely difficult to transmit the massive amounts of data needed to exert the effective performance of the mobile Internet of Things. In order to transmit large amounts of data between moving networks with extreme efficiency, a technique called "beam steering" will play a key role. Instead of transmitting broadband wireless data signals in all directions, beam-steering technology sends the data to the specific user location that needs the data. This saves power, enables more users to obtain high-bandwidth wireless signals, and prevents signals from interfering with each other.
如何实现波束控制:How to implement beam steering:
第1步:识别并定位移动物联网传感器模块;确定其各端点位于何处。Step 1: Identify and locate the Mobile IoT sensor module; determine where its various endpoints are located.
第2步:计算如何以及在何处形成无线窄束图形,从而可以只将精确的直接信号发送到所需的端点天线处。Step 2: Calculate how and where to form the wireless narrow beam pattern so that the precise direct signal can only be sent to the desired endpoint antenna.
第3步:设置发往端点的通信信号。Step 3: Set up communication signals to endpoints.
波束控制现已成为可能,这就是数据密集型的移动物联网系统并未采用无线链路来交换信息的最大的一个原因,5G通信解决了这一问题。Beam steering is now possible, which is one of the biggest reasons why data-intensive mobile IoT systems do not use wireless links to exchange information. 5G communication solves this problem.
5G+天基互联网的融合中,云服务可采用虹云系列卫星,现有的云计算,无论如何发展一定会受到固定物理空间限制,但空间计算却不一样,因为有了天地一体网络,所有终端都能通过它实现入网操控。In the integration of 5G + space-based Internet, cloud services can use Hongyun series satellites. Existing cloud computing will be limited by fixed physical space in any case, but space computing is different, because with the integrated network of heaven and earth, all terminals It can be used to achieve network control.
而在通讯协议方面,必须率先考虑借用TCP/IP级标准进行兼容,以保障实现传统协议与卫星协议的无缝切换,便于消费者、物与物之间在任何一个合理位置接收信号,提升用户体验。In terms of communication protocols, we must first consider borrowing TCP/IP-level standards for compatibility to ensure seamless switching between traditional protocols and satellite protocols, so that consumers, things and things can receive signals at any reasonable location, improving user experience.
基于5G标准的毫米波低地球轨道互联网星座,与NB-ioT(窄带蜂窝物联网)的结合,5G的低时延、高可靠和天基低轨道低功耗大连接的天地互联。The millimeter-wave low-earth orbit Internet constellation based on the 5G standard, combined with NB-ioT (Narrowband Cellular Internet of Things), 5G's low-latency, high-reliability, and space-based low-orbit low-power, low-power, high-connection sky-earth interconnection.
系统将建成为全球无缝覆盖的空间信息网络基础设施,能够为地面固定、手持移动、车载、船载、机载等各类终端,提供互联网传输服务,可在深海大洋、南北两极等区域实现宽、窄带结合的通信保障能力。通过这样一个全球无缝覆盖的系统,处于地球上任何地点的任何人或者任何物体,都可以在任何时间实现信息互联。The system will be built into a spatial information network infrastructure with seamless global coverage, which can provide Internet transmission services for various terminals such as ground fixed, hand-held mobile, vehicle-mounted, ship-borne, and air-borne. The communication guarantee capability of the combination of wide and narrowband. Through such a seamless global coverage system, any person or any object anywhere on the earth can achieve information interconnection at any time.
实现6个方面的应用能力:Achieve 6 aspects of application capabilities:
①智能终端通信,支持商业手机直接接入卫星星座,提供高清晰语音服务、微信等即时通信服务、电子邮件服务等;①Intelligent terminal communication, supporting commercial mobile phones to directly access satellite constellations, providing high-definition voice services, instant messaging services such as WeChat, email services, etc.;
②互联网接入,提供低延迟的数据服务能力,使用户享受到与地面网络近似的上网体验,面向野外作业和远洋作业等市场,实现远程教育、远程医疗服务保障;②Internet access, providing low-latency data service capabilities, enabling users to enjoy an online experience similar to that of terrestrial networks, targeting markets such as field operations and ocean-going operations, and realizing remote education and remote medical service guarantees;
③物联网接入,服务于低能耗微型化物联网终端,重点开拓环境监测、远洋物流、危化品监控、交通管理、智慧海洋等新型产业需求;③ IoT access, serving low-energy miniaturized IoT terminals, focusing on developing new industrial needs such as environmental monitoring, ocean logistics, hazardous chemicals monitoring, traffic management, and smart oceans;
④热点信息推送,充分利用卫星广域覆盖的特性,实现文化宣传、灾害预警、公共安全警告、天气播报、头条新闻播发、交通广播等热点焦点信息的实时播发推送;④Hot information push, make full use of the characteristics of satellite wide area coverage, realize the real-time broadcast and push of hot focus information such as cultural publicity, disaster warning, public safety warning, weather broadcast, headline news broadcast, traffic broadcast;
⑤导航增强,转发北斗差分改正信息,为机载、车载定位终端提供更加精准可靠的位置服务,满足无人汽车驾驶、无人机管控、精准农业、工程机械市场的发展需求;⑤ Navigation enhancement, forwarding Beidou differential correction information, providing more accurate and reliable location services for airborne and vehicle positioning terminals, and meeting the development needs of unmanned vehicle driving, drone control, precision agriculture, and construction machinery markets;
⑥航空航海监视,能够实现全球飞机、船舶的全周期跟踪、提供统计数据增值服务。⑥ Aviation and navigation monitoring, which can realize the full-cycle tracking of global aircraft and ships, and provide statistical data value-added services.
共识机制的标准化数据接口实现“多链-中继链-跨链”的融合,流量传输,数据交互、混合存储。不同跨链、联盟链之间的数据交互、流量传输和资产转移的多链融合的智能合约。多链系统取代了单链,各链地位上也完全平等,并逻辑上尽量隔离的独立共识系统的实例所构成,它们并行工作,分摊全网的吞吐、计算、存储的压力,分摊全网状态的维护工作。The standardized data interface of the consensus mechanism realizes the integration of "multi-chain-relay chain-cross-chain", traffic transmission, data interaction, and mixed storage. A multi-chain integrated smart contract for data interaction, traffic transmission and asset transfer between different cross-chains and alliance chains. The multi-chain system replaces the single chain, and the status of each chain is completely equal, and it is composed of instances of independent consensus systems that are logically isolated as much as possible. They work in parallel to share the throughput, calculation, and storage pressure of the entire network, and share the state of the entire network. maintenance work.
打造一个可伸缩的容器,在完全保持原生链技术架构、存储架构、治理组织的前提下,在不发生“化学作用”的前提下,为原生链间提供流通交互、互联互通服务。形成一个网状的价值流量资源池,那些分散在各个链的资产、流量将通过、高速网络自由兑换、流动和价值转化。To create a scalable container, on the premise of completely maintaining the technical architecture, storage architecture, and governance organization of the native chain, and on the premise of no "chemical effect", it can provide circulation, interaction and interconnection services between native chains. A networked value flow resource pool will be formed, and those assets and flows scattered in various chains will be freely exchanged, flowed and valued through the high-speed network.
1、共识机制:1. Consensus mechanism:
iLAB-x.com共识机制源于实验空间-国家虚拟仿真实验教学项目共享平台,为自有知识产权的,关于《公示2019年度国家虚拟仿真实验教学项目申报材料并开展网络用户使用评价的公告》,教高司函〔2019〕33号《教育部高等教育司关于开展2019年度国家虚拟仿真实验教学项目认定工作的通知》成为国家虚拟仿真实验教学项目共享技术接口规范。The iLAB-x.com consensus mechanism originates from the experimental space - the national virtual simulation experiment teaching project sharing platform, which has its own intellectual property rights. Announcement on "Announcement of 2019 National Virtual Simulation Experiment Teaching Project Application Materials and Evaluation of Network Users" , Jiaogao Secretary Letter [2019] No. 33 "Notice of the Higher Education Department of the Ministry of Education on Carrying out the Certification of the National Virtual Simulation Experiment Teaching Project in 2019" has become the national virtual simulation experiment teaching project sharing technical interface specification.
共识机制概述:采用链上存储数据哈希值,云计算存储数据的双层分布式存储结构;用哈希算法解决API接口调用者进行安全验证问题;以AES256算法和密钥相关哈希运算消息认证码进行用户身份识别避免二次登陆,识别后用户在相关供应商操作状态和产生的数据自动回传到共享交易平台;利用时间戳解决数据交换格式和数据传输的安全性;利用根链优先共识机制进行网络分片和交易分片,实现链外向链内的附件上传服务,该共识机制视频流传输性能优良,且物联网终端设备标准化接口。Overview of consensus mechanism: adopting a two-layer distributed storage structure that stores data hash values on the chain and cloud computing to store data; uses a hash algorithm to solve the security verification problem of API interface callers; uses AES256 algorithm and key-related hash operations on messages The authentication code is used to identify the user to avoid secondary login. After identification, the user's operating status and the data generated by the relevant supplier are automatically sent back to the shared trading platform; the time stamp is used to solve the data exchange format and the security of data transmission; the root chain is used to give priority to The consensus mechanism performs network sharding and transaction sharding, and realizes the upload service of attachments from outside the chain to the inside of the chain. The consensus mechanism has excellent video streaming performance and standardized interfaces for IoT terminal devices.
2、智能合约2. Smart contracts
智能合约基于Docker容器级,是目前企业级应用的最佳实践和落地方案,支持目前大部分云主机方式部署,支持个人高性能主机部署。Based on the Docker container level, smart contracts are currently the best practice and implementation solution for enterprise-level applications. They support most current cloud host deployments and support personal high-performance host deployments.
加密世界提供智能合约开发接口给第三方提供服务,包括但不限于视频、VR及AR、游戏、商品交易等。项目方或开发者可以通过调用智能合约接口确定可经营的项目,也可通过选取不同的智能合约组合实现自行经营和代理经营并获得经营性收益。总之,CWV的智能合约为项目方或用户提供自主选择的机会,通过不同的经营模式获得相应的收益。Crypto World provides smart contract development interfaces to third parties to provide services, including but not limited to video, VR and AR, games, commodity trading, etc. The project party or developer can determine the projects that can be operated by calling the smart contract interface, and can also realize self-operation and agency operation and obtain operational benefits by selecting different smart contract combinations. In short, CWV's smart contracts provide project parties or users with the opportunity to choose independently, and obtain corresponding benefits through different business models.
3,合约虚拟机:3. Contract virtual machine:
云计算方式布署虚拟机,图灵完备双层架构,一层为分片(即子链层),一层为根链,合约虚拟机。能够提供更高的性能保障,为上层的Dapps应用提供技术保障。The virtual machine is deployed in the cloud computing method, and the Turing complete two-layer architecture, one layer is the shard (ie, the sub-chain layer), and the other is the root chain, which is the contract virtual machine. It can provide higher performance guarantee and provide technical guarantee for the upper-layer Dapps application.
4,集群节点:4. Cluster nodes:
集群节点起到一个超级节点的作用,可存储完整帐本The cluster node acts as a super node and can store the complete ledger
一个节点也可以只保存一部分帐本(例如,只记录单个分片的账本)。这种情况下,它必须依赖于网络中的其他参与者来帮助确定其余的分片数据和/或根链数据的有效性。保证去中心化。A node can also keep only a part of the ledger (for example, only record the ledger of a single shard). In this case, it must rely on other participants in the network to help determine the validity of the remaining shard data and/or root chain data. Decentralization is guaranteed.
5,网状网络,动态路由5. Mesh network, dynamic routing
A主动的健康检查:这包括对网络链路状态监测、对服务器的应用状态深度健康检查,智能合约多样化的健康检查方式,可以在链路层面、服务器硬件层面、应用软件层对双中心的可用情况做出准确的判断,从而确定双中心是否需要切换、以及是整体切换还是部分资源切换。A Active health check: This includes monitoring network link status, in-depth health check on server application status, and diversified health check methods for smart contracts. Accurate judgment can be made according to the available situation, so as to determine whether the dual center needs to be handed over, and whether it is an overall handover or a partial resource handover.
B灵活的负载分担策略:以充分利用集群节点的资源,提升资源利用率。可以根据业务需要,基于用户来源地域、延时情况、使用的运营商、负载权重等不同的因素来制定负载分担策略,实现在多节点之间进行业务的分配。B Flexible load sharing strategy: to fully utilize the resources of cluster nodes and improve resource utilization. According to business needs, a load sharing strategy can be formulated based on different factors such as user source region, delay situation, used operator, and load weight, so as to realize business distribution among multiple nodes.
C基于业务在集群节点中,经常可能的切换对IP地址提出了动态漂移的要求,合约可以提供一对一、一对多、多对多的地址转换,灵活适应业务切换的需要。C Based on the business, in the cluster nodes, the often possible switching puts forward dynamic drift requirements for IP addresses. The contract can provide one-to-one, one-to-many, and many-to-many address translation, flexibly adapting to the needs of business switching.
根链集群节点方式实现一个超级节点的功能,避免中心化,集群节点支持完整帐本,也为一个网状网络,功能上完全一致、地位上也完全平等,它们并行工作,分摊全网的吞吐、计算、存储的压力,分摊全网状态的维护工作;如访问,www.ilab—x.com发起NS请求。The root chain cluster node method realizes the function of a super node and avoids centralization. The cluster node supports a complete account book and is also a mesh network. It is completely consistent in function and equal in status. They work in parallel to share the throughput of the entire network. , calculation, storage pressure, and share the maintenance work of the entire network state; such as access, www.ilab-x.com initiates an NS request.
步骤1、首先向其所在运营商的local dns发起www.ilab—x.com域名;步骤2、运营商的ENS服务器通过递归查找到ENS主、辅服务器;步骤3、4:接受请求的根链智能合约首先查询本地是否有该Local DNS的就近性表项,如果存在则直接给localDNS返回速度最快的服务器地址。如果不存在,则根链智能合约的ENS解析器ocalDNS的查询。步骤5、智能合约解析两节点分别对LocalDNS进行Probe。例如ISP1侧智能合约查询该LocalDNS的RTT时间为150ms。而ISP2侧GTM查询同一LocalDNS的RTT时间为300ms,则此时在节点内都形成了该localDNS应就近性表记录。接受到LocalDNS请求得根链智能合约根据系统的就近性表返回相应的DATAcenter的WEB服务器地址。步骤6、在用户lical DNS获得地址后,将改地址返回给用户;用户向网站发起访问;集群节点为互联网业务提供多个互联网接口,北京节点A包含电信出口与联通出口;北京节点B包含电信出口、联通出口和移动出口;武汉节点C包含电信出口。Step 1. First initiate the www.ilab-x.com domain name to the local dns of the operator; Step 2. The operator's ENS server finds the ENS primary and secondary servers through recursion; Steps 3 and 4: Accept the requested root chain The smart contract first queries whether there is a proximity entry of the Local DNS locally, and if it exists, it directly returns the fastest server address to the local DNS. If not present, the query of the ENS resolver localDNS of the root chain smart contract. Step 5. The smart contract resolves the two nodes to Probe LocalDNS respectively. For example, the RTT time for the smart contract on the ISP1 side to query the LocalDNS is 150ms. However, the RTT time of the GTM query on the ISP2 side for the same LocalDNS is 300ms. At this time, the localDNS should be nearness table records are formed in the node. After receiving the LocalDNS request, the root chain smart contract returns the corresponding DATAcenter WEB server address according to the proximity table of the system. Step 6. After the user's lical DNS obtains the address, the changed address is returned to the user; the user initiates access to the website; the cluster nodes provide multiple Internet interfaces for Internet services, and the Beijing node A includes the telecommunications exit and the China Unicom exit; the Beijing node B includes the telecommunications Exit, Unicom Exit and Mobile Exit; Wuhan Node C contains Telecom Exit.
根链智能合约选择出口时,不仅需要考虑哪个节点距离用户较近,还要考虑跨运营商网络限制的问题,目前国内主要的电信运营商有电信、网通、移动三大运营商,跨运营商的访问往往很慢,最好的方式是将客户流量定向到与客户端相同运营商的节点。When choosing the export of the root chain smart contract, it is not only necessary to consider which node is closer to the user, but also to consider the problem of cross-operator network restrictions. At present, the main domestic telecom operators are China Telecom, China Netcom, and China Mobile. Access is often slow, and the best way is to direct customer traffic to a node of the same operator as the client.
同时考虑地域就近性原则,将南方电信客户定向到武汉节点电信出口。将北方电信客户定向到北京节点电信出口;同运营商的两个数据中心的选择依据是RTT,在每个节点对客户端进行反向探测,根据探测响应结果进行选择。At the same time, considering the principle of geographical proximity, the Southern Telecom customers are directed to the Wuhan Node Telecom Export. Direct Northern Telecom customers to the telecom exit of the Beijing node; the selection of the two data centers of the same operator is based on RTT, and reverse detection is performed on the client at each node, and selection is made according to the detection response results.
D合约自定义脚本的定制编写,可实现不同业务定制化的流量牵引,例如对集群节点的突发流量应急调度牵引,出向流量的优化控制,根据业务场景动态选择不同的SNAT/SSL profile等;Customized writing of D contract custom scripts can realize customized traffic traction for different services, such as emergency scheduling and traction of sudden traffic for cluster nodes, optimal control of outbound traffic, and dynamic selection of different SNAT/SSL profiles according to business scenarios;
E可预设定的接管顺序:通过集群节点之间的切换和接管,牵引业务流在数据中心之间重新分布,更为重要的是,集群节点之间的切换可以预先定义接管顺序,使多活中心的运维是可管理和可预期的,并符合数据中心的分布使得延时和影响最小。这种可以预定义接管顺序已在业界得到了实践验证。E Preset takeover sequence: Through the switching and takeover between cluster nodes, the traction business flow is redistributed among data centers. More importantly, the switching between cluster nodes can predefine the takeover sequence, so that multiple The operation and maintenance of the live center is manageable and predictable, and conforms to the distribution of the data center to minimize the delay and impact. This predefinable takeover sequence has been proven in practice in the industry.
F切换的协同联动:往往由于实际客观条件的限制,会存在某些环节不能实现完全的冗余备份,例如最常见的是与不同运营商的网络出口,例如电信、联通的线路配备了双出口,但是移动、广电等线路还是单出口。我们需要将集群节点的各个环节进行梳理,针对实际建设中的单点环节,专门考虑协同切换,将受影响的因素进行捆绑协同。Collaborative linkage of F handover: Often due to the limitation of actual objective conditions, there are some links that cannot achieve complete redundancy backup. For example, the most common is the network exit with different operators, such as the lines of China Telecom and China Unicom are equipped with dual exits , but the lines of mobile, radio and television are still single export. We need to sort out the various links of the cluster nodes, and specifically consider collaborative switching for the single-point link in the actual construction, and bundle and coordinate the affected factors.
G运维自动化考虑:包括和系统、应用的配合互动,包括监控和响应。由于集群节点涉及到的环节和流程特别多,为了更好地运维,可采用大量的自动化脚本,同时充分利用合约接口,可实现一键DC切换,一键DB切换,自动配置采集及上传,配置合规性检验,单一数节点配置关联性提取,多节点配置一致性对比,合约应用统一视图生成等,并和统一运维管理平台进行集成,提升多节点环境下的运维水平和运维能力。G Operation and maintenance automation considerations: including interaction with systems and applications, including monitoring and response. Since there are many links and processes involved in cluster nodes, in order to better operate and maintain, a large number of automated scripts can be used, and at the same time, the contract interface can be fully utilized to achieve one-click DC switching, one-click DB switching, automatic configuration collection and upload, Configuration compliance inspection, single-node configuration correlation extraction, multi-node configuration consistency comparison, contract application unified view generation, etc., and integrated with the unified operation and maintenance management platform to improve the operation and maintenance level and operation and maintenance in the multi-node environment ability.
快速感知和故障快速恢复:当一个数据中心业务发生故障时,健康检查和探测对故障的感知降到分钟级甚至秒级,在大部分故障场景下,可实现分钟级甚至秒级的切换。Fast perception and fault recovery: When a data center service fails, the health check and detection can detect the fault in minutes or even seconds. In most failure scenarios, switchover can be achieved in minutes or even seconds.
6,跨链交易6. Cross-chain transactions
带有智能API,实现跨链的交易和确认。With a smart API, it enables cross-chain transactions and confirmations.
混合链的第一需求:私链与公链的互联。私链本质上是私有的,通过认证的各方将区块链的访问权限限制为仅对其用户开放。这通常是一个由业务合作伙伴组成的网络,或者通过它们的操作进行连接,并从共享的防篡改数据库中获益。The first requirement of the hybrid chain: the interconnection of the private chain and the public chain. Private chains are inherently private, with authenticated parties limiting access to the blockchain to only their users. This is typically a network of business partners or connected through their operations and benefiting from a shared tamper-proof database.
比如中国银行行业协议(CBA)推出“中国贸易融资银行间交易区块链平台”,汇丰、中国银行、农业银行即是其许可结点和成员单位。用户必须在进入网络之前获得访问权限。此外,访问权限只能由管理私有区块链的权限授予。For example, the China Banking Industry Agreement (CBA) launched the "China Trade Finance Interbank Transaction Blockchain Platform", and HSBC, Bank of China, and Agricultural Bank of China are its license nodes and member units. Users must gain access before entering the network. Furthermore, access can only be granted by the authority that manages the private blockchain.
显然,私链的优势是效率高、处理速度快,能够适应复杂的应用场景需要,另外其可控性好,能够满足监管要求,不会出现分叉等情况。Obviously, the advantages of a private chain are high efficiency, fast processing speed, and the ability to adapt to complex application scenarios. In addition, it has good controllability and can meet regulatory requirements without forking.
但是,私链终归是私有的,而且也存在中心化的情况。当前公链项目已经形成一个庞大的存在,在很多业务场景,私链必须与公有链相结合才能确保业务链条的完整性。However, private chains are private after all, and there is also a situation of centralization. At present, the public chain project has formed a huge existence. In many business scenarios, the private chain must be combined with the public chain to ensure the integrity of the business chain.
典型的应用场景如跨境支付业务,一家国际贸易企业如建立了自己的私链,将商品上链提供商业服务,同时也通过XRP等公链和其他机构进行跨境支付。Typical application scenarios are cross-border payment business. For example, an international trade company has established its own private chain to provide commercial services by putting commodities on the chain. At the same time, it also conducts cross-border payments through public chains such as XRP and other institutions.
混合链的第一需求:私有许可链与公链的结合。The first requirement of the hybrid chain: the combination of a private permissioned chain and a public chain.
顾名思义,私有区块链本质上是私有的,通过认证的各方将区块链的访问权限限制为仅对其用户开放。这通常是一个由业务合作伙伴组成的网络,或者通过它们的操作进行连接,并从共享的防篡改数据库中获益。As the name suggests, private blockchains are private in nature, with authenticated parties limiting access to the blockchain to only their users. This is typically a network of business partners or connected through their operations and benefiting from a shared tamper-proof database.
比如中国银行行业协议(CBA)推出“中国贸易融资银行间交易区块链平台”,汇丰、中国银行、农业银行即是其许可结点和成员单位。用户必须在进入网络之前获得访问权限。此外,访问权限只能由管理私有区块链的权限授予。For example, the China Banking Industry Agreement (CBA) launched the "China Trade Finance Interbank Transaction Blockchain Platform", and HSBC, Bank of China, and Agricultural Bank of China are its license nodes and member units. Users must gain access before entering the network. Furthermore, access can only be granted by the authority that manages the private blockchain.
显然,私有许可链的优势是效率高、处理速度快,能够适应复杂的应用场景需要,另外其可控性好,能够满足监管要求,不会出现分叉等情况。Obviously, the advantages of a private license chain are high efficiency, fast processing speed, and the ability to adapt to complex application scenarios. In addition, it has good controllability and can meet regulatory requirements without forking.
但是,私有许可链终归是私有的、小集体的,而且也存在中心化的情况。当前公链项目已经形成一个庞大的存在,在很多业务场景,私有许可链必须与公有链相结合才能确保业务链条的完整性。However, private permissioned chains are, after all, private, collective, and centralized. At present, the public chain project has formed a huge existence. In many business scenarios, the private license chain must be combined with the public chain to ensure the integrity of the business chain.
第二需求:公链跨链公链领域,公链数据具有原生性,并不能直接去接收外部的数据。每一条公链就像一个平行的世界,无法产生快速的交互行为,导致了每一条公链的价值无法进行转移,公链与公链之间就像一个个孤立的岛屿一样,这就是价值孤岛。跨链的本质是解决不同区块链之间的交互,当然每一个项目他们的实现逻辑不太一样,中继链、平行链、转接桥,在Substrate协议下面,重新塑造一条新的链会非常简单,这样来看,就是在塑造一个属于波卡的生态系统,所有的新链都会用到波卡的底层Substrate协议。而去对接现有的存在的公链的时候,则需要用的转接桥,然后对接进来,当然了对接现有的哪一条链还需要具体的开发协议。The second requirement: In the field of public chain and cross-chain public chain, public chain data is native and cannot directly receive external data. Each public chain is like a parallel world, which cannot produce fast interactive behavior, resulting in the inability to transfer the value of each public chain. The public chain and the public chain are like isolated islands. This is the value island. . The essence of cross-chain is to solve the interaction between different blockchains. Of course, the implementation logic of each project is different. Relay chain, parachain, transfer bridge, under the Substrate protocol, re-shape a new chain will be Very simple, in this way, it is shaping an ecosystem that belongs to Polkadot, and all new chains will use Polkadot's underlying Substrate protocol. When connecting to the existing public chain, you need to use a transfer bridge, and then connect to it. Of course, which existing chain to connect to requires a specific development protocol.
这样看来理论上来说是在创造一个新的跨链系统或者说新的跨链生态,而这个跨链生态对于现有的公链来说有一定的排斥性,比如对于用户量多的公链比如以太坊或者比特币网络来说,会专门开发转接桥来进行兼容,但是对于一些用户量不是那么多的公链来说,包容性就不会那么强,可能不会去开发转接桥来进行兼容。This seems to be theoretically creating a new cross-chain system or a new cross-chain ecosystem, and this cross-chain ecosystem is somewhat exclusive to existing public chains, such as those with a large number of users. For example, for the Ethereum or Bitcoin network, a transfer bridge will be specially developed for compatibility, but for some public chains with not so many users, the inclusiveness will not be so strong, and the transfer bridge may not be developed. to be compatible.
上面说到的跨链生态虽然可以实现跨链,但是生态内的区块链大部分都是基于Substrate协议,而另外的一条明星跨链项目cosmos同样也用了不同的底层协议,其实这两种协议是不兼容的,理论上来说,不同的跨链生态之间同样产生了另外一种价值孤岛问题,不同的是这个孤岛的面积比公链的公链孤岛面积大一些而已。Although the cross-chain ecology mentioned above can realize cross-chain, most of the blockchains in the ecology are based on the Substrate protocol, and another star cross-chain project cosmos also uses different underlying protocols. In fact, these two The protocol is incompatible. In theory, another kind of value island problem arises between different cross-chain ecosystems. The difference is that the area of this island is larger than that of the public chain.
智能API:不仅支持单链、公链的联通,还支持跨链之间,甚至于对联盟链的互操作。Smart API: Not only supports the interconnection of single chains and public chains, but also supports interoperability between cross chains and even alliance chains.
合约会架设出不同用途的公有链、私有链或者联盟链,基于对性能和安全性及应用场景的不同需求,然后嫁接不同行业的应用。比如一条支持高并发的通信类公有链,一条侧重安全性的支付联盟链,和基于 法律存证的公证网络系统。The contract will set up public chains, private chains or alliance chains for different purposes, based on different requirements for performance, security and application scenarios, and then graft applications in different industries. For example, a communication public chain that supports high concurrency, a payment alliance chain that focuses on security, and a notary network system based on legal deposit.
如为防止数据篡改的证据上链、版权上链等;当第一交易或第二交易属于资产与非资产混合交易时,所述第一数据包内或第二数据包包括资产价值转移数据,还包括需上链存储、交换、修改等的数据信息,在进行价值转移的同时,还可进行数据的上链存储、交换、修改等。也就是说直播内容上传的同时,可伴随资产价值的转移,扩展了商业应用场景For example, in order to prevent data tampering evidence on the chain, copyright on the chain, etc.; when the first transaction or the second transaction is a mixed transaction of assets and non-assets, the first data packet or the second data packet includes asset value transfer data, It also includes data information that needs to be stored, exchanged, and modified on the chain. While transferring value, data can also be stored, exchanged, and modified on the chain. That is to say, while the live content is uploaded, it can be accompanied by the transfer of asset value, expanding the commercial application scenarios
多场景应用Multi-scene application
区块链技术可以提供一整套追踪新闻来源的解决方案,从而实现媒体信源认证。区块链技术采写的内容不能被私自修改,即使数据被修改过,其历史记录也可以追溯;使用“猕讯”发布的新闻在被加密的同时,共享到多台个人计算机上,第三方机构很难进行篡改。Blockchain technology can provide a complete set of solutions for tracking news sources, so as to achieve media source authentication. The content collected and written by blockchain technology cannot be modified privately. Even if the data is modified, its historical records can be traced back; the news published using "Kai News" is encrypted and shared to multiple personal computers, third-party organizations It is difficult to tamper with.
数字版权:区块链技术能以国家授时中心同步时间戳的数字签名对新闻作品,影视作品,互联网作品,音乐作版权进行精准跟踪,从确权、用权、维权三个环节完整记录新闻作品版权流转过程。使用人工智能和区块链加固技术,提供版权登记、转授权合同备案登记、版权检索、版权交易、版税结算、侵权举报和维权申诉等一系列服务。Digital copyright: Blockchain technology can accurately track the copyright of news works, film and television works, Internet works, and music works with the digital signature of the synchronized timestamp of the National Time Service Center, and completely record news works from the three links of right confirmation, right use, and rights protection. Copyright transfer process. Using artificial intelligence and blockchain reinforcement technology, it provides a series of services such as copyright registration, sub-licensing contract filing and registration, copyright retrieval, copyright transaction, royalty settlement, infringement reporting and rights protection appeal.
交易平台:借助区块链技术,撰稿人和自媒体可以通过智能合约对内容自主定价,绕过媒体平台直接和“粉丝”互动,获取打赏和订阅费用。用户可以用DCT(DECENT平台的代币)进行支付,第一时间获取所需要的内容。Trading platform: With the help of blockchain technology, writers and self-media can independently price content through smart contracts, bypass the media platform and directly interact with "fans" to obtain rewards and subscription fees. Users can pay with DCT (the token of the DECENT platform) to get the content they need at the first time.
传播效果统计:解决传媒业广告营销效果不透明、有偏差的问题,如点击量作弊等帮助广告主和媒体提高运营效率和准确性。Communication effect statistics: solve the problems of opaque and biased advertising and marketing effects in the media industry, such as click cheating, etc., to help advertisers and media improve operational efficiency and accuracy.
政府、行业、企业、院校等共同参与的质量评价机制:数据进行存储、管理和大数据挖掘,以图形化方式展示,综合数据分析、状态数据采集情况分析,每项分析结果的支持度置信度、发散度的计算和孤立点分析,由点到线,到面的营销体系放大,实现智能化的场景营销,能够更加便捷地满足服务消费者,真正实现了实体商业核心能力的重构。Quality evaluation mechanism with the participation of government, industry, enterprises, colleges, etc.: data storage, management and big data mining, graphical display, comprehensive data analysis, analysis of status data collection, and confidence in the support of each analysis result The calculation of degree and divergence and the analysis of isolated points, enlarge the marketing system from point to line, to plane, realize intelligent scene marketing, can meet the service consumers more conveniently, and truly realize the reconstruction of the core capabilities of real business.
终身教育:将农村远程教育系统和各职业院校数字化校园通过数据互连,使计算机的交互性、通信的分布性、电视融为一体。实现“资源通融、内容兼融、宣传互融、利益共融”。Lifelong education: The rural distance education system and the digital campuses of various vocational colleges are interconnected through data to integrate the interactivity of computers, the distribution of communications, and television. Realize "resource integration, content integration, publicity integration, and interest integration".
混合式教学:教研应用等内容,并能满足不同客户端的应用,包括PC、笔记本、IOS移动端、ANDROID移动端等终端,。采用区块链去中心化分布式设计可实现多级平台部署,支持无限级平台接入和分离。即一个学校可以直接进行单一部署,只需简单配置可实现多个学校与区级平台、市级平台、省级平台的整合,当合并的学校想脱离合并资源平台的话,也可配置网站进行脱离将在线教学和传统教学的优势结合起来的一种"线上"+"线下"的教学。混合式教学就是希望把传统的课堂讲授通过微视频上线的形式进行前移,给予学生充分的学习时间,尽可能让每个学生都带着较好的知识基础走进教室。从而充分保障课堂教学的质量。线下有活动,活动要能够检验、巩固、转化线上知识的学习;过程有评估,线上和线下,过程和结果都需要开展评估。Blended teaching: teaching and research applications, etc., and can meet the application of different clients, including PC, notebook, IOS mobile terminal, ANDROID mobile terminal and other terminals. The decentralized and distributed design of blockchain can realize multi-level platform deployment and support unlimited level platform access and separation. That is to say, a school can directly carry out a single deployment, and only a simple configuration can realize the integration of multiple schools with district-level platforms, municipal-level platforms, and provincial-level platforms. When the merged school wants to separate from the combined resource platform, it can also configure the website to separate A kind of "online" + "offline" teaching that combines the advantages of online teaching and traditional teaching. Blended teaching is to move the traditional classroom lectures forward through the online form of micro-videos, give students sufficient study time, and let each student walk into the classroom with a better knowledge base as much as possible. In order to fully guarantee the quality of classroom teaching. There are offline activities, and the activities must be able to test, consolidate, and transform online knowledge learning; there are evaluations in the process, both online and offline, and the process and results need to be evaluated.
实施例3Example 3
本实施例提供了一种设备,所述设备包括:一个或多个处理器;存储器,用于存储一个或多个程序,当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如以上所述的方法。This embodiment provides a device, the device includes: one or more processors; a memory for storing one or more programs, when the one or more programs are executed by the one or more processors , causing the one or more processors to perform the method as described above.
此外,本实施例提供了一种存储有计算机程序的存储介质,该程序被处理器执行时实现如以上实施例1所述的方法。In addition, this embodiment provides a storage medium storing a computer program, and when the program is executed by a processor, the method described in Embodiment 1 above is implemented.
图1为本发明一实施例提供的一种设备的结构示意图。FIG. 1 is a schematic structural diagram of a device according to an embodiment of the present invention.
如图1所示,作为另一方面,本申请还提供了一种设备500,包括一个或多个中央处理单元(CPU)501,其可以根据存储在只读存储器(ROM)502中的程序或者从存储部分508加载到随机访问存储器(RAM)503中的程序而执行各种适当的动作和处理。在RAM503中,还存储有设备500操作所需的各种程序和数据。CPU501、ROM502以及RAM503通过总线504彼此相连。输入/输出(I/O)接口505也连接至总线504。As shown in FIG. 1 , as another aspect, the present application also provides a device 500, comprising one or more central processing units (CPUs) 501, which can operate according to a program stored in a read-only memory (ROM) 502 or Various appropriate actions and processes are executed from the program loaded into the random access memory (RAM) 503 from the storage section 508 . In the RAM 503, various programs and data necessary for the operation of the device 500 are also stored. The CPU 501 , the ROM 502 , and the RAM 503 are connected to each other through a bus 504 . An input/output (I/O) interface 505 is also connected to bus 504 .
以下部件连接至I/O接口505:包括键盘、鼠标等的输入部分506;包括诸如阴极射线管(CRT)、液 晶显示器(LCD)等以及扬声器等的输出部分507;包括硬盘等的存储部分508;以及包括诸如LAN卡、调制解调器等的网络接口卡的通信部分509。通信部分509经由诸如因特网的网络执行通信处理。驱动器510也根据需要连接至I/O接口505。可拆卸介质511,诸如磁盘、光盘、磁光盘、半导体存储器等等,根据需要安装在驱动器510上,以便于从其上读出的计算机程序根据需要被安装入存储部分508。The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, etc.; an output section 507 including a cathode ray tube (CRT), a liquid crystal display (LCD), etc., and a speaker, etc.; a storage section 508 including a hard disk, etc. ; and a communication section 509 including a network interface card such as a LAN card, a modem, and the like. The communication section 509 performs communication processing via a network such as the Internet. A drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, etc., is mounted on the drive 510 as needed so that a computer program read therefrom is installed into the storage section 508 as needed.
特别地,根据本申请公开的实施例,上述任一实施例描述的方法可以被实现为计算机软件程序。例如,本申请公开的实施例包括一种计算机程序产品,其包括有形地包含在机器可读介质上的计算机程序,所述计算机程序包含用于执行上述任一实施例描述的方法的程序代码。在这样的实施例中,该计算机程序可以通过通信部分509从网络上被下载和安装,和/或从可拆卸介质511被安装。In particular, according to the embodiments disclosed in the present application, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing the method described in any of the above-described embodiments. In such an embodiment, the computer program may be downloaded and installed from the network via the communication portion 509 and/or installed from the removable medium 511 .
作为又一方面,本申请还提供了一种计算机可读存储介质,该计算机可读存储介质可以是上述实施例的装置中所包含的计算机可读存储介质;也可以是单独存在,未装配入设备中的计算机可读存储介质。计算机可读存储介质存储有一个或者一个以上程序,该程序被一个或者一个以上的处理器用来执行描述于本申请的方法。As yet another aspect, the present application also provides a computer-readable storage medium. The computer-readable storage medium may be a computer-readable storage medium included in the apparatus of the foregoing embodiment; A computer-readable storage medium in a device. The computer-readable storage medium stores one or more programs that are used by one or more processors to perform the methods described herein.
附图中的流程图和框图,图示了按照本发明各种实施例的系统、方法和计算机程序产品的可能实现的体系架构、功能和操作。在这点上,流程图或框图中的每个方框可以代表一个模块、程序段、或代码的一部分,该模块、程序段、或代码的一部分包含一个或多个用于实现规定的逻辑功能的可执行指令。也应当注意,在有些作为替换的实现中,方框中所标注的功能也可以以不同于附图中所标注的顺序发生。例如,两个接连地表示的方框实际上可以基本并行地执行,它们有时也可以按相反的顺序执行,这根据所涉及的功能而定。也要注意的是,框图和/或流程图中的每个方框、以及框图和/或流程图中的方框的组合,可以通过执行规定的功能或操作的专用的基于硬件的系统来实现,或者可以通过专用硬件与计算机指令的组合来实现。The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code that contains one or more logical functions for implementing the specified functions executable instructions. It should also be noted that, in some alternative implementations, the functions noted in the blocks may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It is also noted that each block of the block diagrams and/or flowchart illustrations, and combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by dedicated hardware-based systems that perform the specified functions or operations , or can be implemented by a combination of dedicated hardware and computer instructions.
描述于本申请实施例中所涉及到的单元或模块可以通过软件的方式实现,也可以通过硬件的方式来实现。所描述的单元或模块也可以设置在处理器中,例如,各所述单元可以是设置在计算机或移动智能设备中的软件程序,也可以是单独配置的硬件装置。其中,这些单元或模块的名称在某种情况下并不构成对该单元或模块本身的限定。The units or modules involved in the embodiments of the present application may be implemented in a software manner, and may also be implemented in a hardware manner. The described units or modules may also be provided in the processor, for example, each of the units may be a software program provided in a computer or a mobile smart device, or may be a separately configured hardware device. Wherein, the names of these units or modules do not constitute limitations on the units or modules themselves under certain circumstances.
以上描述仅为本申请的较佳实施例以及对所运用技术原理的说明。本领域技术人员应当理解,本申请中所涉及的发明范围,并不限于上述技术特征的特定组合而成的技术方案,同时也应涵盖在不脱离本申请构思的情况下,由上述技术特征或其等同特征进行任意组合而形成的其它技术方案。例如上述特征与本申请中公开的(但不限于)具有类似功能的技术特征进行互相替换而形成的技术方案。The above description is only a preferred embodiment of the present application and an illustration of the applied technical principles. Those skilled in the art should understand that the scope of the invention involved in the present application is not limited to the technical solutions formed by the specific combination of the above-mentioned technical features, and should also cover, without departing from the concept of the present application, the above-mentioned technical features or Other technical solutions formed by any combination of its equivalent features. For example, a technical solution is formed by replacing the above-mentioned features with the technical features disclosed in this application (but not limited to) with similar functions.

Claims (15)

  1. 一种网络融合的组网方法,其特征在于,包括:A networking method for network fusion, comprising:
    解析验证通过的一笔以上的第一交易,判断第一交易是否为包含有第一运营商网元节点请求组网的交易,若是,则根据至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易内容,基于NFV/SDN技术对请求加入的第一运营商网元节点进行网络分片,将请求组网的第一运营商网元节点分配至第一网络,并向第一运营商网元节点发送将请求组网的第一运营商网元节点分配至第一网络的消息;Parse more than one first transaction that has passed the verification, and determine whether the first transaction is a transaction that includes the first operator's network element node requesting networking; The required consensus method and the first transaction content including the identity of the first operator's network element node requesting networking, perform network fragmentation on the first operator's network element node requesting to join based on NFV/SDN technology, and network the request The first operator's network element node is allocated to the first network, and a message is sent to the first operator's network element node to allocate the first operator's network element node requesting networking to the first network;
    接收请求组网的第一运营商网元节点的响应消息;receiving a response message from the first operator's network element node requesting networking;
    判断请求组网的第一运营商网元节点是否同意分配至第一网络;若是,则将第一交易,及包含有将请求组网的第一运营商网元节点分配至第一网络的交易打包上链;若否,则将第一交易,及包含有将请求组网的第一运营商网元节点拒绝分配至第一网络的交易打包上链。Determine whether the first operator's network element node requesting networking agrees to be allocated to the first network; if so, the first transaction and the transaction that includes the first operator's network element node requesting networking is allocated to the first network Packaging and uploading to the chain; if not, the first transaction and the transaction including the refusal to assign the network element node of the first operator requesting networking to the first network are packaged and uploaded to the chain.
  2. 根据权利要求1所述的一种网络融合的组网方法,其特征在于,所述网络分片根据不同的需求,对物理基础设施或底层网络服务和功能的实例化,形成一个以上的第一运营商网元节点,根据所述组网方法进行组网,形成一个以上的第一网络。The networking method for network convergence according to claim 1, wherein the network fragmentation instantiates physical infrastructure or underlying network services and functions according to different requirements to form more than one first The operator network element node performs networking according to the networking method to form more than one first network.
  3. 根据权利要求1所述的一种网络融合的组网方法,其特征在于,一个所述第一网络对应一个IP协议栈实例。The networking method for network convergence according to claim 1, wherein one first network corresponds to one IP protocol stack instance.
  4. 一种网络融合的组网方法,其特征在于,根据权利要求1-3任意一项所述的一种网络融合的组网方法,包括:A networking method for network fusion, characterized in that the networking method for network fusion according to any one of claims 1-3, comprising:
    向根链发送至少包括请求组网的第一运营商网元节点要求的共识方法、请求组网的第一运营商网元节点身份在内的第一交易;Send a first transaction to the root chain including at least the consensus method required by the first operator network element node requesting networking and the identity of the first operator network element node requesting networking;
    接收根链发来的将请求组网的第一运营商网元节点分配至第一网络的消息;receiving a message from the root chain for assigning the network element node of the first operator that requests networking to the first network;
    向根链发送同意或不同意分配至第一网络的响应消息。A response message agreeing or not agreeing to the assignment to the first network is sent to the root chain.
  5. 一种网络融合方法,其特征在于,根据权利要求1-4任意一项所述的一种网络融合的组网方法,包括:A method for network fusion, characterized in that the networking method for network fusion according to any one of claims 1-4, comprising:
    接收第一运营商网元节点发来的请求利用不同于第一运营商的第二运营商的资源的第一请求交易,第一运营商网元节点身份验证通过后,则将第一转换合约接口发送至第一运营商网元节点;Receive the first request transaction from the first operator's network element node requesting to use the resources of the second operator different from the first operator. After the first operator's network element node passes the identity verification, the first conversion contract is performed. The interface is sent to the network element node of the first operator;
    接收第一运营商网元节点访问和退出第一转换合约接口的消息;receiving a message that the first operator's network element node accesses and exits the first conversion contract interface;
    向第一运营商网元节点发送第一运营商网元节点访问和退出第一转换合约接口的基本信息;收到第一运营商网元节点发来的确认消息后上链;Send the basic information of the first operator's network element node to access and exit the first conversion contract interface to the first operator's network element node; upload the chain after receiving the confirmation message sent by the first operator's network element node;
    其中,所述根链上设置一个以上的第一转换合约,所述第一转换合约用于将所述第二运营商的资源访问和利用接口转换成第一运营商网元节点可访问和利用的接口方式;Wherein, more than one first conversion contract is set on the root chain, and the first conversion contract is used to convert the resource access and utilization interface of the second operator into a network element node of the first operator that can be accessed and used. interface;
    所述第一运营商网元节点向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;The first operator network element node sends a first request transaction to the root chain for requesting to utilize resources of a second operator different from the first operator;
    若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;If the identity verification of the first operator's network element node is passed, the first conversion contract interface is received;
    访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;Access the first conversion contract interface, and send a message to the root chain to access the first conversion contract interface;
    退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;Exit the first conversion contract interface, and send a message to the root chain to exit the first conversion contract interface;
    接收根链发来的访问和退出第一转换合约接口的基本信息;Receive basic information about accessing and exiting the first conversion contract interface from the root chain;
    核实访问和退出第一转换合约接口的基本信息,并反馈给根链。Verify the basic information of accessing and exiting the first conversion contract interface, and feed it back to the root chain.
  6. 根据权利要求5所述的一种网络融合方法,其特征在于:A kind of network fusion method according to claim 5, is characterized in that:
    所述第一运营商网元节点身份验证的过程,包括:The process of the first operator's network element node identity verification includes:
    对第一运营商网元节点待验证的加密密钥进行哈希运算,得到待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对,若一致,则通过所述加密密钥对第一运营商网元节点身份信息的密文,通过AES256算法解密得到第一运营商网元节点身份信息的明文,访问方身份验证通过;若待验证的加密密钥哈希值,与根链上的加密密钥哈希值比对不一致,则第一运营商网元节点身份验证不通过;Perform a hash operation on the encryption key to be verified by the first operator's network element node to obtain the encryption key hash value to be verified, and compare it with the encryption key hash value on the root chain. The encryption key is used to decrypt the ciphertext of the identity information of the first operator's network element node through AES256 algorithm to obtain the plaintext of the identity information of the first operator's network element node, and the identity verification of the access party is passed; if the encryption key to be verified is hashed If it is inconsistent with the hash value of the encryption key on the root chain, the first operator's network element node identity verification fails;
    相应地,所述第一运营商网元节点身份加密的过程为:Correspondingly, the process of encrypting the identity of the first operator's network element node is:
    通过加密密钥将第一运营商网元节点身份信息的明文根据AES256算法得到第一运营商网元节点身份信息的密文;Obtain the ciphertext of the identity information of the first operator's network element node according to the plaintext of the identity information of the first operator's network element node according to the AES256 algorithm by using the encryption key;
    对加密密钥进行哈希运算后得到加密密钥哈希值,将加密密钥哈希值及第一运营商网元节点身份信息的密文在根链中上链。After performing hash operation on the encryption key, a hash value of the encryption key is obtained, and the hash value of the encryption key and the ciphertext of the identity information of the first operator's network element node are uploaded in the root chain.
  7. 根据权利要求5所述的一种网络融合方法,其特征在于:A kind of network fusion method according to claim 5, is characterized in that:
    所述上链包括将上链内容保存至云计算或雾计算存储空间中。The on-chain includes saving the on-chain content in cloud computing or fog computing storage space.
  8. 根据权利要求5所述的一种网络融合方法,其特征在于:A kind of network fusion method according to claim 5, is characterized in that:
    所述根链与版权注册机构通过第一转换合约接口进行数据交互;所述数据交互的方法包括:The root chain and the copyright registration agency perform data interaction through the first conversion contract interface; the data interaction method includes:
    接收第一运营商网元节点发来的请求注册数字版权证书的第二请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求注册数字版权证书的第二请求交易;After receiving the second request transaction from the first operator's network element node requesting to register the digital copyright certificate, after the first operator's network element node's identity verification is passed, the root chain sends the first transaction to the digital rights registration authority through the first conversion contract interface. The second request transaction of the operator's network element node requesting to register the digital rights certificate;
    若符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的包含有DCI的数字版权证书,转发给第一运营商网元节点;If it complies with the review regulations of the digital rights registration agency, the root chain receives the digital rights certificate containing the DCI sent by the digital rights registration agency, and forwards it to the first operator's network element node;
    若不符合数字版权注册机构审查规定,则根链接收数字版权注册机构发送的修改注册数字版权材料的通知,或不授予数字版权证书的通知,转发给第一运营商网元节点;If it does not meet the review regulations of the digital copyright registration agency, the root chain receives the notification sent by the digital copyright registration agency to modify the registered digital copyright material, or the notification that the digital copyright certificate is not granted, and forward it to the first operator's network element node;
    或,or,
    接收第一运营商网元节点发来的请求验证数字版权证书DCI的第三请求交易,第一运营商网元节点身份验证通过后,根链通过第一转换合约接口向数字版权注册机构发送第一运营商网元节点请求验证数字版权证书DCI的第三请求交易;Receive the third request transaction sent by the first operator's network element node requesting to verify the digital copyright certificate DCI, after the first operator's network element node's identity verification is passed, the root chain sends the first conversion contract interface to the digital rights registration authority. An operator network element node requests a third request transaction for verifying the digital rights certificate DCI;
    若数字版权注册机构验证通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证通过的通知,转发给第一运营商网元节点;If the verification of the digital rights registration authority is passed, the root chain receives the notification of the successful verification of the digital copyright certificate DCI sent by the digital rights registration authority, and forwards it to the network element node of the first operator;
    若数字版权注册机构验证不通过,则根链接收数字版权注册机构发送的数字版权证书DCI验证不通过的通知,转发给第一运营商网元节点,版权保护机构和知识产权法院认可的证据平台存证。If the verification of the digital copyright registration agency fails, the root chain receives the notification that the DCI verification of the digital copyright certificate is not passed by the digital copyright registration agency, and forwards it to the first operator's network element node, the copyright protection agency and the evidence platform recognized by the intellectual property court. Evidence.
  9. 一种网络融合方法,其特征在于,根据权利要求5-8任一项所述的一种网络融合方法,包括:A method for network fusion, characterized in that the method for network fusion according to any one of claims 5-8, comprising:
    向根链发送请求利用不同于第一运营商的第二运营商的资源的第一请求交易;sending a first request transaction to the root chain requesting to utilize resources of a second operator different from the first operator;
    若第一运营商网元节点身份验证通过,则接收到第一转换合约接口;If the identity verification of the first operator's network element node is passed, the first conversion contract interface is received;
    访问第一转换合约接口,并向根链发送访问第一转换合约接口的消息;Access the first conversion contract interface, and send a message to the root chain to access the first conversion contract interface;
    退出第一转换合约接口,并向根链发送退出第一转换合约接口的消息;Exit the first conversion contract interface, and send a message to the root chain to exit the first conversion contract interface;
    接收根链发来的访问和退出第一转换合约接口的基本信息;Receive basic information about accessing and exiting the first conversion contract interface from the root chain;
    核实访问和退出第一转换合约接口的基本信息,并反馈给根链。Verify the basic information for accessing and exiting the first conversion contract interface, and feed it back to the root chain.
  10. 根据权利要求9所述的一种网络融合方法,其特征在于,A kind of network fusion method according to claim 9, is characterized in that,
    所述第一转换合约接口还用于与版权注册机构进行数据交互,所述与版权注册机构进行数据交互的方法为:The first conversion contract interface is also used for data interaction with the copyright registration authority, and the method for data interaction with the copyright registration authority is:
    向根链发送请求注册数字版权证书所需的材料的第二请求交易;Send a second request transaction to the root chain requesting the material required to register a digital rights certificate;
    若符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的包含有DCI的数字版权证书;If it complies with the review regulations of the digital copyright registration authority, receive the digital copyright certificate containing DCI sent by the digital copyright registration authority forwarded by the root chain;
    若不符合数字版权注册机构审查规定,则接收根链转发的数字版权注册机构发送的修改注册数字版权材料的通知,或不授予数字版权证书的通知。If it does not meet the review regulations of the digital copyright registration authority, it will receive the notification of modifying the registered digital copyright material sent by the digital copyright registration authority forwarded by the root chain, or the notification of not granting the digital copyright certificate.
  11. 一种网络融合方法,其特征在于,根据权利要求5-10任一项所述的一种网络融合方法,包括:A method for network fusion, characterized in that the method for network fusion according to any one of claims 5-10, comprising:
    向第一运营商网元节点发送利用不同于第一运营商的第二运营商的资源的请求;sending a request to utilize resources of a second operator different from the first operator to the network element node of the first operator;
    接收第一运营商网元节点发来的第一转换合约接口;receiving the first conversion contract interface sent by the network element node of the first operator;
    访问第一转换合约接口,并通过第一运营商网元节点向根链发送访问第一转换合约接口的消息;Access the first conversion contract interface, and send a message for accessing the first conversion contract interface to the root chain through the first operator network element node;
    退出第一转换合约接口,并通过第一运营商网元节点向根链发送退出第一转换合约接口的消息;Exit the first conversion contract interface, and send a message for exiting the first conversion contract interface to the root chain through the first operator network element node;
    接收通过第一运营商网元节点转发来的根链发来的访问和退出第一转换合约接口的基本信息;Receive the basic information of accessing and exiting the first conversion contract interface sent by the root chain forwarded by the first operator's network element node;
    核实访问和退出第一转换合约接口的基本信息,并通过第一运营商网元节点反馈给根链;Verify the basic information for accessing and exiting the first conversion contract interface, and feed it back to the root chain through the first operator's network element node;
    其中,接收到终端发来的利用不同于第一运营商的第二运营商的资源的请求后,Wherein, after receiving the request from the terminal to utilize the resources of the second operator different from the first operator,
    所述第一运营商网元节点向根链发送终端请求利用不同于第一运营商的第二运营商的资源的第一请求交易;The network element node of the first operator sends a first request transaction of a terminal requesting to utilize resources of a second operator different from the first operator to the root chain;
    若第一运营商网元节点及终端身份验证通过,则接收到第一转换合约接口并转发终端;If the identity verification of the first operator's network element node and the terminal is passed, the first conversion contract interface is received and forwarded to the terminal;
    接收并向根链发送终端访问第一转换合约接口的消息;Receive and send a message to the root chain that the terminal accesses the first conversion contract interface;
    接收并向根链发送终端退出第一转换合约接口的消息;Receive and send a message to the root chain that the terminal exits the first conversion contract interface;
    接收根链发来的终端访问和退出第一转换合约接口的基本信息;Receive the basic information of terminal access and exit from the first conversion contract interface sent by the root chain;
    接收并向根链反馈终端核实访问和退出第一转换合约接口的基本信息,进行上链。Receive and feed back to the root chain the terminal to verify the basic information for accessing and exiting the first conversion contract interface, and upload it to the chain.
  12. 根据权利要求11所述的一种网络融合方法,其特征在于,所述终端与第一运营商网元节点之间,以及第一运营商网元节点与根链之间,及第一运营商网元节点之间,终端之间均采用天基互联网、5G通信或星地通信。The method for network integration according to claim 11, wherein, between the terminal and the first operator's network element node, between the first operator's network element node and the root chain, and between the first operator's network element node and the first operator Between network element nodes and terminals, space-based Internet, 5G communication or satellite-to-ground communication are used.
  13. 根据权利要求11所述的一种网络融合方法,其特征在于,所述第一运营商网元节点为通信基站或卫星。The method for network integration according to claim 11, wherein the first operator network element node is a communication base station or a satellite.
  14. 一种设备,其特征在于,所述设备包括:A device, characterized in that the device comprises:
    一个或多个处理器;one or more processors;
    存储器,用于存储一个或多个程序,memory for storing one or more programs,
    当所述一个或多个程序被所述一个或多个处理器执行时,使得所述一个或多个处理器执行如权利要求1-13中任一项所述的方法。The one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-13.
  15. 一种存储有计算机程序的存储介质,其特征在于,该程序被处理器执行时实现如权利要求1-13中任一项所述的方法。A storage medium storing a computer program, characterized in that, when the program is executed by a processor, the method according to any one of claims 1-13 is implemented.
PCT/CN2021/093077 2020-07-28 2021-05-11 Network convergence method and networking method for network convergence, and device and storage medium WO2022021997A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010737059.4 2020-07-28
CN202010737059.4A CN111934919B (en) 2020-07-28 2020-07-28 Network convergence and networking method, equipment and storage medium thereof

Publications (1)

Publication Number Publication Date
WO2022021997A1 true WO2022021997A1 (en) 2022-02-03

Family

ID=73314723

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/093077 WO2022021997A1 (en) 2020-07-28 2021-05-11 Network convergence method and networking method for network convergence, and device and storage medium

Country Status (2)

Country Link
CN (1) CN111934919B (en)
WO (1) WO2022021997A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426031A (en) * 2022-11-03 2022-12-02 中国电子科技集团公司第五十四研究所 Concentrated and distributed combined space-based network routing control system
CN115618429A (en) * 2022-12-20 2023-01-17 北京理工大学 Product full life cycle management system based on parallel block chain
CN117240621A (en) * 2023-11-13 2023-12-15 腾讯科技(深圳)有限公司 Processing method and device of network request, computer readable medium and electronic equipment

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111934919B (en) * 2020-07-28 2022-02-08 厦门潭宏信息科技有限公司 Network convergence and networking method, equipment and storage medium thereof
CN114666873A (en) * 2020-12-03 2022-06-24 华为技术有限公司 Wireless communication method, device and system
CN112926059B (en) * 2021-04-07 2024-04-23 恒安嘉新(北京)科技股份公司 Data processing method, device, equipment and storage medium
CN113286340B (en) * 2021-05-17 2022-11-04 中国联合网络通信集团有限公司 Slice selection auxiliary information configuration method, system, node and storage medium
CN113328782B (en) * 2021-05-25 2022-07-26 清华大学 Block chain-based satellite-ground network resource sharing architecture system and operation method thereof
CN113194523B (en) * 2021-06-04 2022-08-02 中国联合网络通信集团有限公司 Network connection establishing method, device, terminal and storage medium
CN113595979B (en) * 2021-06-25 2022-12-27 福建师范大学 Crowdsourcing data privacy protection method based on cross-chain
CN113613205B (en) * 2021-07-11 2023-06-13 西北工业大学 Network access mechanism suitable for wireless avionics internal communication network
CN113965567B (en) * 2021-10-13 2023-09-08 中国人民解放军战略支援部队航天工程大学 Space-based information comprehensive application and information distribution system based on Mesh network
CN114679450A (en) * 2022-02-11 2022-06-28 锐捷网络股份有限公司 Access control method and device, electronic equipment and storage medium
CN114844895A (en) * 2022-05-05 2022-08-02 中国电信股份有限公司 Edge application processing method, platform, electronic device and storage medium
CN114928617B (en) * 2022-06-15 2023-07-21 中国电信股份有限公司 Private network subscription data management method, device, equipment and medium
CN115242646B (en) * 2022-06-15 2024-02-13 西安电子科技大学 Block chain-based network slice application method and related device
CN115022352B (en) * 2022-07-28 2024-03-08 江苏荣泽信息科技股份有限公司 End edge cloud fusion-based segmented side chain data acquisition and storage system
CN115314523A (en) * 2022-08-03 2022-11-08 上海船舶运输科学研究所有限公司 VPN-based marine communication gateway remote management system and method
CN116744261B (en) * 2023-08-16 2023-11-28 深圳市永达电子信息股份有限公司 Millimeter wave communication network and edge calculation fusion method
CN117880331B (en) * 2024-03-13 2024-05-24 北京邮电大学 Block chain data sharing method and device for ocean satellite Internet of things

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method
CN109242467A (en) * 2018-09-17 2019-01-18 金蝶软件(中国)有限公司 Network-building method, device, computer equipment and storage medium based on block chain
WO2020052747A1 (en) * 2018-09-12 2020-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Management of devices joining a network
CN111163182A (en) * 2020-03-20 2020-05-15 杭州海康威视数字技术股份有限公司 Block chain-based device registration method and apparatus, electronic device, and storage medium
CN111383021A (en) * 2020-05-29 2020-07-07 腾讯科技(深圳)有限公司 Node management method, device, equipment and medium based on block chain network
CN111934919A (en) * 2020-07-28 2020-11-13 厦门潭宏信息科技有限公司 Network convergence and networking method, equipment and storage medium thereof

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2001277890A1 (en) * 2000-07-14 2002-01-30 Equifax, Inc. Systems and methods for secured electronic transactions
US10700936B2 (en) * 2015-06-02 2020-06-30 Huawei Technologies Co., Ltd. System and methods for virtual infrastructure management between operator networks
CN108701278B (en) * 2015-12-28 2023-01-10 皇家Kpn公司 Method for providing a service to a user equipment connected to a first operator network via a second operator network
US10278123B2 (en) * 2016-07-04 2019-04-30 Apple Inc. Network slice selection
US10523526B2 (en) * 2016-12-28 2019-12-31 Acronis International Gmbh System and method for managing services and licenses using a blockchain network
CN108230109A (en) * 2018-01-02 2018-06-29 罗梅琴 A kind of shared system and method based on block chain technology
CN110311883B (en) * 2018-03-27 2020-11-10 华为技术有限公司 Identity management method, device, communication network and storage medium
CN110348830B (en) * 2019-06-20 2022-09-27 国家信息中心 Block chain-based network system, authentication method, equipment and storage medium
CN110535627B (en) * 2019-08-07 2022-09-02 中国联合网络通信集团有限公司 Data query method and block chain platform

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108833081A (en) * 2018-06-22 2018-11-16 中国人民解放军国防科技大学 Block chain-based equipment networking authentication method
WO2020052747A1 (en) * 2018-09-12 2020-03-19 Telefonaktiebolaget Lm Ericsson (Publ) Management of devices joining a network
CN109242467A (en) * 2018-09-17 2019-01-18 金蝶软件(中国)有限公司 Network-building method, device, computer equipment and storage medium based on block chain
CN111163182A (en) * 2020-03-20 2020-05-15 杭州海康威视数字技术股份有限公司 Block chain-based device registration method and apparatus, electronic device, and storage medium
CN111383021A (en) * 2020-05-29 2020-07-07 腾讯科技(深圳)有限公司 Node management method, device, equipment and medium based on block chain network
CN111934919A (en) * 2020-07-28 2020-11-13 厦门潭宏信息科技有限公司 Network convergence and networking method, equipment and storage medium thereof

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426031A (en) * 2022-11-03 2022-12-02 中国电子科技集团公司第五十四研究所 Concentrated and distributed combined space-based network routing control system
CN115618429A (en) * 2022-12-20 2023-01-17 北京理工大学 Product full life cycle management system based on parallel block chain
CN117240621A (en) * 2023-11-13 2023-12-15 腾讯科技(深圳)有限公司 Processing method and device of network request, computer readable medium and electronic equipment
CN117240621B (en) * 2023-11-13 2024-02-02 腾讯科技(深圳)有限公司 Processing method and device of network request, computer readable medium and electronic equipment

Also Published As

Publication number Publication date
CN111934919B (en) 2022-02-08
CN111934919A (en) 2020-11-13

Similar Documents

Publication Publication Date Title
WO2022021997A1 (en) Network convergence method and networking method for network convergence, and device and storage medium
Liyanage et al. A comprehensive guide to 5G security
Afolabi et al. Network slicing and softwarization: A survey on principles, enabling technologies, and solutions
US10042665B2 (en) Customer premises equipment (CPE) with virtual machines for different service providers
Pujolle Software Networks: Virtualization, SDN, 5G, and Security
Prados-Garzon et al. 5G non-public networks: Standardization, architectures and challenges
CN110476453A (en) For providing the service granting that network is sliced to client
CN111612466B (en) Consensus and resource transmission method, device and storage medium
CN103596178B (en) Single-station CORS system and differential data transmission and authentication method thereof
Sabella et al. Edge computing: from standard to actual infrastructure deployment and software development
US10362120B2 (en) Distributed gateways with centralized data center for high throughput satellite (HTS) spot beam network
US11838273B2 (en) Extending cloud-based virtual private networks to radio-based networks
Debbabi et al. 5G network slicing: Fundamental concepts, architectures, algorithmics, projects practices, and open issues
NetWorld2020 5g: Challenges, research priorities, and recommendations
Quintana-Ramirez et al. The making of 5g: Building an end-to-end 5g-enabled system
Yarali Public safety networks from LTE to 5G
Salina et al. Next Generation Networks: perspectives and potentials
Uniyal et al. 5GUK Exchange: Towards sustainable end-to-end multi-domain orchestration of softwarized 5G networks
Dang et al. Integrated service discovery and placement in information-centric vehicular network slices
Kitanov et al. Introduction to fog computing
Metzler et al. The 2015 Guide to SDN and NFV
Balan et al. LISP Optimisation of Mobile Data Streaming in Connected Societies
US20210218616A1 (en) System for hosting data link layer agent, protocol, and management functions
US11871284B1 (en) Integrating multiple access technologies in a radio-based network
Velrajan An Introduction to 5G Wireless Networks: Technology, Concepts and Use-Cases

Legal Events

Date Code Title Description
NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21851502

Country of ref document: EP

Kind code of ref document: A1